Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
Traditionally, collaborative filtering (CF) algorithms used for recommendation operate on complete knowledge. This makes these algorithms hard to employ in a decentralized contex...
We address the problem of extracting semantics of tags ? short, unstructured text-labels assigned to resources on the Web ? based on each tag's metadata patterns. In particul...
Pervasive resp. ubiquitous systems use context information to adapt appliance behavior to human needs. Even more convenience is reached if the appliance foresees the user's de...
Jan Petzold, Faruk Bagci, Wolfgang Trumler, Theo U...
Geography is becoming increasingly important in web search. Search engines can often return better results to users by analyzing features such as user location or geographic terms...
Qingqing Gan, Josh Attenberg, Alexander Markowetz,...