Sciweavers

890 search results - page 149 / 178
» Comparative expert reviews
Sort
View
IS
2010
13 years 7 months ago
Building concepts for AI agents using information theoretic Co-clustering
Abstract--High level conceptual thought seems to be at the basis of the impressive human cognitive ability, and AI researchers aim to replicate this ability in artificial agents. C...
Jason R. Chen
USS
2010
13 years 7 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
JAMIA
2010
76views more  JAMIA 2010»
13 years 4 months ago
The inadvertent disclosure of personal health information through peer-to-peer file sharing programs
Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheu...
Khaled El Emam, Emilio Neri, Elizabeth Jonker, Mar...
SISAP
2011
IEEE
437views Data Mining» more  SISAP 2011»
13 years 20 days ago
Succinct nearest neighbor search
In this paper we present a novel technique for nearest neighbor searching dubbed neighborhood approximation. The central idea is to divide the database into compact regions repres...
Eric Sadit Tellez, Edgar Chávez, Gonzalo Na...
COMSUR
2011
263views Hardware» more  COMSUR 2011»
12 years 9 months ago
Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches
—Wireless sensor networks (WSNs) have been applied to many applications since emerging. Among them, one of the most important applications is Sensor Data Collections, where sense...
Feng Wang, Jiangchuan Liu