Sciweavers

3334 search results - page 636 / 667
» Using User Models in Music Information Retrieval Systems
Sort
View
SOSP
2003
ACM
14 years 5 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
14 years 2 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
ACMDIS
2008
ACM
13 years 11 months ago
Exploring true multi-user multimodal interaction over a digital table
True multi-user, multimodal interaction over a digital table lets co-located people simultaneously gesture and speak commands to control an application. We explore this design spa...
Edward Tse, Saul Greenberg, Chia Shen, Clifton For...
DEXA
2009
Springer
124views Database» more  DEXA 2009»
14 years 3 months ago
VisiNav: Visual Web Data Search and Navigation
Semantic Web technologies facilitate data integration over a large number of sources with decentralised and loose coordination, ideally leading to interlinked datasets which descri...
Andreas Harth
PIMRC
2008
IEEE
14 years 3 months ago
Base-station and subcarrier assignment in two-cell OFDMA downlink under QoS fairness
Abstract— Consider the problem of base-station and subcarrier assignment on the downlink of a two-cell OFDMA system with adaptive modulation. The aim is to maximize a common data...
Ayman Alsawah, Inbar Fijalkow