Sciweavers

1606 search results - page 142 / 322
» Inferring Personal Information from Demand-Response Systems
Sort
View
SIGSOFT
2003
ACM
14 years 8 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
IPM
2007
182views more  IPM 2007»
13 years 8 months ago
A probabilistic music recommender considering user opinions and audio features
A recommender system has an obvious appeal in an environment where the amount of on-line information vastly outstrips any individual’s capability to survey. Music recommendation...
Qing Li, Sung-Hyon Myaeng, Byeong Man Kim
CHI
2011
ACM
12 years 11 months ago
Modeling users of intelligent systems
While many devices today increasingly have the ability to predict human activities, it is still difficult to build accurate personalized machine learning models. As users today wi...
Stephanie Rosenthal
ERCIMDL
2010
Springer
142views Education» more  ERCIMDL 2010»
13 years 9 months ago
Effective Term Weighting for Sentence Retrieval
A well-known challenge of information retrieval is how to infer a user's underlying information need when the input query consists of only a few keywords. Question Answering (...
Saeedeh Momtazi, Matthew Lease, Dietrich Klakow
TNN
1998
125views more  TNN 1998»
13 years 7 months ago
Symbolic connectionism in natural language disambiguation
Abstract—Natural language understanding involves the simultaneous consideration of a large number of different sources of information. Traditional methods employed in language an...
Samuel W. K. Chan, James Franklin