Sciweavers

24680 search results - page 4760 / 4936
» Learning
Sort
View
SIGECOM
2010
ACM
183views ECommerce» more  SIGECOM 2010»
14 years 2 months ago
Assessing regret-based preference elicitation with the UTPREF recommendation system
Product recommendation and decision support systems must generally develop a model of user preferences by querying or otherwise interacting with a user. Recent approaches to elici...
Darius Braziunas, Craig Boutilier
SIGMETRICS
2010
ACM
143views Hardware» more  SIGMETRICS 2010»
14 years 2 months ago
Practical performance models for complex, popular applications
Perhaps surprisingly, no practical performance models exist for popular (and complex) client applications such as Adobe’s Creative Suite, Microsoft’s Office and Visual Studio...
Eno Thereska, Bjoern Doebel, Alice X. Zheng, Peter...
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 2 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
CIVR
2010
Springer
276views Image Analysis» more  CIVR 2010»
14 years 2 months ago
Optimizing visual search with implicit user feedback in interactive video retrieval
This paper describes an approach to optimize query by visual example results, by combining visual features and implicit user feedback in interactive video retrieval. To this end, ...
Stefanos Vrochidis, Ioannis Kompatsiaris, Ioannis ...
EUROCRYPT
2010
Springer
14 years 2 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
« Prev « First page 4760 / 4936 Last » Next »