Sciweavers

592 search results - page 44 / 119
» Learning of personalized security settings
Sort
View
IV
2010
IEEE
140views Visualization» more  IV 2010»
13 years 6 months ago
GVIS: An Integrating Infrastructure for Adaptively Mashing up User Data from Different Sources
In this article we present an infrastructure for creating mash up visual representations of the user profile that combines data from different sources. We explored this approach ...
Luca Mazzola, Riccardo Mazza
ICPR
2006
IEEE
14 years 9 months ago
GMM-based SVM for face recognition
A new face recognition algorithm is presented. It supposes that a video sequence of a person is available both at enrollment and test time. During enrollment, a client Gaussian Mi...
Gérard Chollet, Hervé Bredin, Najim ...
SOCIALCOM
2010
13 years 5 months ago
A Private and Reliable Recommendation System for Social Networks
Abstract--With the proliferation of internet-based social networks into our lives, new mechanisms to control the release and use of personal data are required. As a step toward thi...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
IDEAL
2004
Springer
14 years 1 months ago
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL...
Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi...
MHCI
2005
Springer
14 years 1 months ago
Mystery in the museum: collaborative learning activities using handheld devices
In this paper, we describe the experience of designing a collaborative learning activity for a traditional historical/cultural museum. The activity, based on a “Mystery in the M...
Jorge Simarro Cabrera, Henar Muñoz Frutos, ...