Sciweavers

2025 search results - page 377 / 405
» Similar Term Discovery using Web Search
Sort
View
RECSYS
2009
ACM
14 years 13 days ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
CVPR
2004
IEEE
13 years 11 months ago
Midstream Content Access of Visual Pattern Coded Imagery
Multimedia retrieval is going to play an increasingly important role in the future. Since the availability of digital media seems ever rising, not only the retrieval performance i...
Gerald Schaefer
AVI
2004
13 years 9 months ago
SWAPit: a multiple views paradigm for exploring associations of texts and structured data
Visualization interfaces that offer multiple coordinated views on a particular set of data items are useful for navigating and exploring complex information spaces. In this paper ...
Andreas Becks, Christian Seeling
IUI
2011
ACM
12 years 10 months ago
Predicting and compensating for lexicon access errors
Learning a foreign language is a long, error-prone process, and much of a learner’s time is effectively spent studying vocabulary. Many errors occur because words are only partl...
Lars Yencken, Timothy Baldwin
CIKM
2009
Springer
14 years 2 months ago
Role of weak ties in link prediction of complex networks
Plenty of algorithms for link prediction have been proposed and were applied to various real networks. Among these works, the weights of links are rarely taken into account. In th...
Linyuan Lu, Tao Zhou