Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
Numerous applications of data mining to scientific data involve the induction of a classification model. In many cases, the collection of data is not performed with this task in m...
Detection of near duplicate documents is an important problem in many data mining and information filtering applications. When faced with massive quantities of data, traditional d...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...
In this paper we present ECS Display, a large plasma screen that tracks the user's point of gaze from a distance, without any calibration. We discuss how we applied ECS Displ...
David Holman, Roel Vertegaal, Changuk Sohn, Daniel...
More and more web users keep up with newest information through information streams such as the popular microblogging website Twitter. In this paper we studied content recommendat...
Jilin Chen, Rowan Nairn, Les Nelson, Michael Berns...