Sciweavers

3557 search results - page 618 / 712
» Reviews
Sort
View
CCS
2009
ACM
14 years 10 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
CHI
2009
ACM
14 years 10 months ago
Visualizing remote voice conversations
Online voice conversations are becoming ever more popular. People have been logging online text conversations, but what about voice conversations? Walter Ong simply states, "...
Pooja Mathur, Karrie Karahalios
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
14 years 10 months ago
Learning from multi-topic web documents for contextual advertisement
Contextual advertising on web pages has become very popular recently and it poses its own set of unique text mining challenges. Often advertisers wish to either target (or avoid) ...
Yi Zhang, Arun C. Surendran, John C. Platt, Mukund...
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 10 months ago
Practical guide to controlled experiments on the web: listen to your customers not to the hippo
The web provides an unprecedented opportunity to evaluate ideas quickly using controlled experiments, also called randomized experiments (single-factor or factorial designs), A/B ...
Ron Kohavi, Randal M. Henne, Dan Sommerfield
KDD
2004
ACM
136views Data Mining» more  KDD 2004»
14 years 10 months ago
A cross-collection mixture model for comparative text mining
In this paper, we define and study a novel text mining problem, which we refer to as Comparative Text Mining (CTM). Given a set of comparable text collections, the task of compara...
ChengXiang Zhai, Atulya Velivelli, Bei Yu