Sciweavers

548 search results - page 101 / 110
» Modeling and predicting personal information dissemination b...
Sort
View
IUI
2006
ACM
14 years 2 months ago
Who's asking for help?: a Bayesian approach to intelligent assistance
Automated software customization is drawing increasing attention as a means to help users deal with the scope, complexity, potential intrusiveness, and ever-changing nature of mod...
Bowen Hui, Craig Boutilier
MM
2009
ACM
187views Multimedia» more  MM 2009»
14 years 1 months ago
Convex experimental design using manifold structure for image retrieval
Content Based Image Retrieval (CBIR) has become one of the most active research areas in computer science. Relevance feedback is often used in CBIR systems to bridge the semantic ...
Lijun Zhang, Chun Chen, Wei Chen, Jiajun Bu, Deng ...
WPES
2003
ACM
14 years 1 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
WINE
2009
Springer
199views Economy» more  WINE 2009»
14 years 3 months ago
Externalities in Keyword Auctions: An Empirical and Theoretical Assessment
It is widely believed that the value of acquiring a slot in a sponsored search list (that comes along with the organic links in a search engine’s result page) highly depends on ...
Renato Gomes, Nicole Immorlica, Evangelos Markakis
SIGMOD
2010
ACM
189views Database» more  SIGMOD 2010»
14 years 1 months ago
Recsplorer: recommendation algorithms based on precedence mining
We study recommendations in applications where there are temporal patterns in the way items are consumed or watched. For example, a student who has taken the Advanced Algorithms c...
Aditya G. Parameswaran, Georgia Koutrika, Benjamin...