Sciweavers

1018 search results - page 182 / 204
» Remote User Authentication Using Public Information
Sort
View
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
14 years 19 days ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
CORR
2008
Springer
176views Education» more  CORR 2008»
13 years 8 months ago
Analysis of Social Voting Patterns on Digg
The social Web is transforming the way information is created and distributed. Authoring tools, e.g., blog publishing services, enable users to quickly and easily publish content,...
Kristina Lerman, Aram Galstyan
ICWSM
2009
13 years 5 months ago
Gesundheit! Modeling Contagion through Facebook News Feed
Whether they are modeling bookmarking behavior in Flickr or cascades of failure in large networks, models of diffusion often start with the assumption that a few nodes start long ...
Eric Sun, Itamar Rosenn, Cameron Marlow, Thomas M....
WMCSA
2008
IEEE
14 years 2 months ago
HealthSense: classification of health-related sensor data through user-assisted machine learning
Remote patient monitoring generates much more data than healthcare professionals are able to manually interpret. Automated detection of events of interest is therefore critical so...
Erich P. Stuntebeck, John S. Davis II, Gregory D. ...
SIGIR
2009
ACM
14 years 2 months ago
Fast nonparametric matrix factorization for large-scale collaborative filtering
With the sheer growth of online user data, it becomes challenging to develop preference learning algorithms that are sufficiently flexible in modeling but also affordable in com...
Kai Yu, Shenghuo Zhu, John D. Lafferty, Yihong Gon...