Sciweavers

664 search results - page 68 / 133
» Mining User Interests from Personal Photos
Sort
View
ADMA
2006
Springer
101views Data Mining» more  ADMA 2006»
14 years 2 months ago
ZED: Explaining Temporal Variations in Query Volume
We hypothesize that the variance in volume of high-velocity queries over time can be explained by observing that these queries are formulated in response to events in the world tha...
Maojin Jiang, Shlomo Argamon, Abdur Chowdhury, Kus...
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
11 years 11 months ago
Factoring past exposure in display advertising targeting
Online advertising is increasingly becoming more performance oriented, where the decision to show an advertisement to a user is made based on the user’s propensity to respond to...
Neha Gupta, Abhimanyu Das, Sandeep Pandey, Vijay K...
TSD
2010
Springer
13 years 6 months ago
Embedded Speech Recognition in UPnP (DLNA) Environment
In the past decade great technological advances have been made in internet services, personal computers, telecommunications, media and entertainment. Many of these advances have be...
Jozef Ivanecký, Radek Hampl
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
14 years 1 months ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 6 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...