Sciweavers

577 search results - page 98 / 116
» Leveraging Data About Users in General in the Learning of In...
Sort
View
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
AAAI
2010
13 years 8 months ago
Collaborative Expert Portfolio Management
We consider the task of assigning experts from a portfolio of specialists in order to solve a set of tasks. We apply a Bayesian model which combines collaborative filtering with a...
David H. Stern, Horst Samulowitz, Ralf Herbrich, T...
POPL
2010
ACM
14 years 4 months ago
Counterexample-Guided Focus
The automated inference of quantified invariants is considered one of the next challenges in software verification. The question of the right precision-efficiency tradeoff for the...
Andreas Podelski, Thomas Wies
ACMDIS
2004
ACM
14 years 25 days ago
Sharing multimedia content with interactive public displays: a case study
The Plasma Posters are large screen, digital, interactive posterboards designed for informal content sharing within teams, groups, organizations and communities. Leveraging the fa...
Elizabeth F. Churchill, Les Nelson, Laurent Denoue...
WSDM
2009
ACM
115views Data Mining» more  WSDM 2009»
14 years 2 months ago
Discovering and using groups to improve personalized search
Personalized Web search takes advantage of information about an individual to identify the most relevant results for that person. A challenge for personalization lies in collectin...
Jaime Teevan, Meredith Ringel Morris, Steve Bush