Sciweavers

592 search results - page 12 / 119
» Learning of personalized security settings
Sort
View
PKDD
2010
Springer
313views Data Mining» more  PKDD 2010»
13 years 6 months ago
Topic Modeling for Personalized Recommendation of Volatile Items
One of the major strengths of probabilistic topic modeling is the ability to reveal hidden relations via the analysis of co-occurrence patterns on dyadic observations, such as docu...
Maks Ovsjanikov, Ye Chen
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 1 months ago
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course
The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...
Art Conklin
CCS
2008
ACM
13 years 9 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
UM
2010
Springer
14 years 23 days ago
Bayesian Credibility Modeling for Personalized Recommendation in Participatory Media
In this paper, we focus on the challenge that users face in processing messages on the web posted in participatory media settings, such as blogs. It is desirable to recommend to us...
Aaditeshwar Seth, Jie Zhang, Robin Cohen
ICML
2006
IEEE
14 years 8 months ago
Personalized handwriting recognition via biased regularization
We present a new approach to personalized handwriting recognition. The problem, also known as writer adaptation, consists of converting a generic (user-independent) recognizer int...
Wolf Kienzle, Kumar Chellapilla