Sciweavers

15379 search results - page 326 / 3076
» Protecting users from
Sort
View
115
Voted
SEC
2007
15 years 5 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
152
Voted
UAI
1998
15 years 5 months ago
Inferring Informational Goals from Free-Text Queries: A Bayesian Approach
People using consumer software applications typically do not use technical jargon when querying an online database of help topics. Rather, they attempt to communicate their goals ...
David Heckerman, Eric Horvitz
111
Voted
FSS
2008
108views more  FSS 2008»
15 years 3 months ago
A collaborative recommender system based on probabilistic inference from fuzzy observations
The problem of building recommender systems has attracted considerable attention in recent years. The objective of this paper is to automatically suggest and rank a list of new it...
Luis M. de Campos, Juan M. Fernández-Luna, ...
138
Voted
ACL
2010
15 years 1 months ago
Generating Fine-Grained Reviews of Songs from Album Reviews
Music Recommendation Systems often recommend individual songs, as opposed to entire albums. The challenge is to generate reviews for each song, since only full album reviews are a...
Swati Tata, Barbara Di Eugenio
191
Voted
IPAW
2010
15 years 1 months ago
Janus: From Workflows to Semantic Provenance and Linked Open Data
Data provenance graphs are form of metadata that can be used to establish a variety of properties of data products that undergo sequences of transformations, typically specified as...
Paolo Missier, Satya Sanket Sahoo, Jun Zhao, Carol...