Sciweavers

15379 search results - page 400 / 3076
» Protecting users from
Sort
View
SIGKDD
2008
138views more  SIGKDD 2008»
15 years 4 months ago
Learning preferences of new users in recommender systems: an information theoretic approach
Recommender systems are a nice tool to help nd items of interest from an overwhelming number of available items. Collaborative Filtering (CF), the best known technology for recomme...
Al Mamunur Rashid, George Karypis, John Riedl
TKDE
2008
115views more  TKDE 2008»
15 years 4 months ago
Time-Aware Web Users' Clustering
Web users clustering is a crucial task for mining information related to users needs and preferences. Up to now, popular clustering approaches build clusters based on usage pattern...
Sophia G. Petridou, Vassiliki A. Koutsonikola, Ath...
IWC
2011
86views more  IWC 2011»
14 years 11 months ago
Selecting users for participation in IT projects: Trading a representative sample for advocates and champions?
The selection of users for participation in IT projects involves trade-offs between multiple criteria, one of which is selecting a representative cross-section of users. This crite...
Rasmus Rasmussen, Anders S. Christensen, Tobias Fj...
TDSC
2011
14 years 11 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...
AAAI
2011
14 years 4 months ago
End-User Feature Labeling via Locally Weighted Logistic Regression
Applications that adapt to a particular end user often make inaccurate predictions during the early stages when training data is limited. Although an end user can improve the lear...
Weng-Keen Wong, Ian Oberst, Shubhomoy Das, Travis ...