Sciweavers

17018 search results - page 3290 / 3404
» From the How to the What
Sort
View
CCS
2008
ACM
13 years 11 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
CCS
2008
ACM
13 years 11 months ago
Robust content-driven reputation
In content-driven reputation systems for collaborative content, users gain or lose reputation according to how their contributions fare: authors of long-lived contributions gain r...
Krishnendu Chatterjee, Luca de Alfaro, Ian Pye
CIKM
2008
Springer
13 years 11 months ago
Fast mining of complex time-stamped events
Given a collection of complex, time-stamped events, how do we find patterns and anomalies? Events could be meetings with one or more persons with one or more agenda items at zero ...
Hanghang Tong, Yasushi Sakurai, Tina Eliassi-Rad, ...
CIKM
2008
Springer
13 years 11 months ago
A sparse gaussian processes classification framework for fast tag suggestions
Tagged data is rapidly becoming more available on the World Wide Web. Web sites which populate tagging services offer a good way for Internet users to share their knowledge. An in...
Yang Song, Lu Zhang 0007, C. Lee Giles
CIKM
2008
Springer
13 years 11 months ago
Tag data and personalized information retrieval
Researchers investigating personalization techniques for Web Information Retrieval face a challenge; that the data required to perform evaluations, namely query logs and clickthro...
Mark James Carman, Mark Baillie, Fabio Crestani
« Prev « First page 3290 / 3404 Last » Next »