Sciweavers

562 search results - page 38 / 113
» Recent Developments in the Design of Conventional Cryptograp...
Sort
View
132
Voted
RECSYS
2009
ACM
15 years 8 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
129
Voted
TCSV
2008
195views more  TCSV 2008»
15 years 3 months ago
Locality Versus Globality: Query-Driven Localized Linear Models for Facial Image Computing
Conventional subspace learning or recent feature extraction methods consider globality as the key criterion to design discriminative algorithms for image classification. We demonst...
Yun Fu, Zhu Li, Junsong Yuan, Ying Wu, Thomas S. H...
147
Voted
DGO
2007
174views Education» more  DGO 2007»
15 years 5 months ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá
124
Voted
VLDB
2007
ACM
124views Database» more  VLDB 2007»
15 years 9 months ago
Ad-hoc Top-k Query Answering for Data Streams
A top-k query retrieves the k highest scoring tuples from a data set with respect to a scoring function defined on the attributes of a tuple. The efficient evaluation of top-k q...
Gautam Das, Dimitrios Gunopulos, Nick Koudas, Niko...
122
Voted
BIOINFORMATICS
2010
170views more  BIOINFORMATICS 2010»
15 years 3 months ago
Joint estimation of DNA copy number from multiple platforms
DNA copy number variants (CNV) are gains and losses of segments of chromosomes, and comprise an important class of genetic variation. Recently, various microarray hybridization ba...
Nancy R. Zhang, Yasin Senbabaoglu, Jun Z. Li