Sciweavers

6549 search results - page 1158 / 1310
» Parsimonious additive models
Sort
View
ACMICEC
2007
ACM
220views ECommerce» more  ACMICEC 2007»
14 years 2 months ago
Asymptotically optimal repeated auctions for sponsored search
We investigate asymptotically optimal keyword auctions, that is, auctions which maximize revenue as the number of bidders grows. We do so under two alternative behavioral assumpti...
Nicolas S. Lambert, Yoav Shoham
ECSQARU
2007
Springer
14 years 2 months ago
Approaches to Constructing a Stratified Merged Knowledge Base
Many merging operators have been proposed to merge either flat or stratified knowledge bases. The result of merging by such an operator is a flat base (or a set of models of the me...
Anbu Yue, Weiru Liu, Anthony Hunter
KDD
2010
ACM
215views Data Mining» more  KDD 2010»
14 years 2 months ago
On the quality of inferring interests from social neighbors
This paper intends to provide some insights of a scientific problem: how likely one’s interests can be inferred from his/her social connections – friends, friends’ friends,...
Zhen Wen, Ching-Yung Lin
ESORICS
2007
Springer
14 years 2 months ago
Satisfiability and Resiliency in Workflow Systems
We propose the role-and-relation-based access control (R2 BAC) model for workflow systems. In R2 BAC, in addition to a user's role memberships, the user's relationships w...
Qihua Wang, Ninghui Li
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
14 years 2 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
« Prev « First page 1158 / 1310 Last » Next »