Sciweavers

3686 search results - page 735 / 738
» Comprehensive comprehensions
Sort
View
SIGIR
2012
ACM
11 years 10 months ago
Predicting the ratings of multimedia items for making personalized recommendations
Existing multimedia recommenders suggest a specific type of multimedia items rather than items of different types personalized for a user based on his/her preference. Assume tha...
Rani Qumsiyeh, Yiu-Kai Ng
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
11 years 10 months ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan
EDBT
2012
ACM
225views Database» more  EDBT 2012»
11 years 10 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
ICSE
2012
IEEE-ACM
11 years 10 months ago
On the naturalness of software
—Natural languages like English are rich, complex, and powerful. The highly creative and graceful use of languages like English and Tamil, by masters like Shakespeare and Avvaiya...
Abram Hindle, Earl T. Barr, Zhendong Su, Mark Gabe...
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
14 years 8 months ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny