Sciweavers

1176 search results - page 228 / 236
» Exploiting Online Games
Sort
View
COLT
2008
Springer
13 years 10 months ago
Adapting to a Changing Environment: the Brownian Restless Bandits
In the multi-armed bandit (MAB) problem there are k distributions associated with the rewards of playing each of k strategies (slot machine arms). The reward distributions are ini...
Aleksandrs Slivkins, Eli Upfal
CSCW
2008
ACM
13 years 10 months ago
Social networks and context-aware spam
Social networks are popular for online communities. This paper evaluates the risk of sophisticated context-aware spam that could result from information sharing on social networks...
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Pra...
AAAI
2010
13 years 10 months ago
Visual Contextual Advertising: Bringing Textual Advertisements to Images
Advertising in the case of textual Web pages has been studied extensively by many researchers. However, with the increasing amount of multimedia data such as image, audio and vide...
Yuqiang Chen, Ou Jin, Gui-Rong Xue, Jia Chen, Qian...
LREC
2010
187views Education» more  LREC 2010»
13 years 10 months ago
Language Technology Resource Center
This paper describes the Language Technology Resource Center (LTRC), a U.S. Government website for providing information and tools for users of languages (e.g., translators, analy...
Jennifer DeCamp
SERVICES
2008
246views more  SERVICES 2008»
13 years 10 months ago
BioFlow: A Web-Based Declarative Workflow Language for Life Sciences
Scientific workflows in Life Sciences are usually complex, and use many online databases, analysis tools, publication repositories and customized computation intensive desktop sof...
Hasan M. Jamil, Bilal El-Hajj-Diab