Sciweavers

1211 search results - page 30 / 243
» Computing Manipulations of Ranking Systems
Sort
View
SIGECOM
2008
ACM
138views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Generalized scoring rules and the frequency of coalitional manipulability
We introduce a class of voting rules called generalized scoring rules. Under such a rule, each vote generates a vector of k scores, and the outcome of the voting rule is based onl...
Lirong Xia, Vincent Conitzer
CHI
2008
ACM
14 years 8 months ago
DRAGON: a direct manipulation interface for frame-accurate in-scene video navigation
We present DRAGON, a direct manipulation interaction technique for frame-accurate navigation in video scenes. This technique benefits tasks such as professional and amateur video ...
Thorsten Karrer, Malte Weiss, Eric Lee, Jan Borche...
CCS
2003
ACM
14 years 27 days ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
ICRA
1994
IEEE
89views Robotics» more  ICRA 1994»
13 years 11 months ago
Computation of Shape Through Controlled Active Exploration
Accurate knowledge of depth continues to be of critical importance in robotic systems. Without accurate depth knowledge, tasks such as inspection, tracking, grasping, and collisio...
Christopher E. Smith, Nikolaos Papanikolopoulos
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 4 months ago
Estimating Probabilities in Recommendation Systems
Modeling ranked data is an essential component in a number of important applications including recommendation systems and websearch. In many cases, judges omit preference among un...
Mingxuan Sun, Guy Lebanon, Paul Kidwell