Sciweavers

2846 search results - page 27 / 570
» Not one click for security
Sort
View
122
Voted
SIGGRAPH
2010
ACM
15 years 8 months ago
Apparent layer operations for the manipulation of deformable objects
We introduce layer operations for single-view 3D deformable object manipulation, in which the user can control the depth order of layered 3D objects resting on a flat ground with...
Takeo Igarashi, Jun Mitani
155
Voted
ECIR
2011
Springer
14 years 7 months ago
Balancing Exploration and Exploitation in Learning to Rank Online
Abstract. As retrieval systems become more complex, learning to rank approaches are being developed to automatically tune their parameters. Using online learning to rank approaches...
Katja Hofmann, Shimon Whiteson, Maarten de Rijke
WINE
2007
Springer
193views Economy» more  WINE 2007»
15 years 10 months ago
Auctions with Revenue Guarantees for Sponsored Search
We consider the problem of designing auctions with worst case revenue guarantees for sponsored search. This problem differs from previous work because of ad dependent clickthroug...
Zoë Abrams, Arpita Ghosh
109
Voted
CRITIS
2007
15 years 5 months ago
The Structure of the Sense of Security, Anshin
Traditional research on security has been based on the assumption that users would feel secure when provided with secure systems and services. In this research we address factors ...
Yuko Murayama, Natsuko Hikage, Yasuhiro Fujihara, ...
AIIA
2003
Springer
15 years 9 months ago
Preprocessing and Mining Web Log Data for Web Personalization
We describe the web usage mining activities of an on-going project, called ClickWorld3 , that aims at extracting models of the navigational behaviour of a web site users. The model...
Miriam Baglioni, U. Ferrara, Andrea Romei, Salvato...