Sciweavers

324 search results - page 47 / 65
» What's in a Step
Sort
View
ECIR
2011
Springer
13 years 2 months ago
Balancing Exploration and Exploitation in Learning to Rank Online
Abstract. As retrieval systems become more complex, learning to rank approaches are being developed to automatically tune their parameters. Using online learning to rank approaches...
Katja Hofmann, Shimon Whiteson, Maarten de Rijke
CRYPTO
2012
Springer
241views Cryptology» more  CRYPTO 2012»
12 years 1 months ago
Crowd-Blending Privacy
We introduce a new definition of privacy called crowd-blending privacy that strictly relaxes the notion of differential privacy. Roughly speaking, k-crowd blending private saniti...
Johannes Gehrke, Michael Hay, Edward Lui, Rafael P...
CVPR
2012
IEEE
12 years 1 months ago
Exemplar-based human action pose correction and tagging
The launch of Xbox Kinect has built a very successful computer vision product and made a big impact to the gaming industry; this sheds lights onto a wide variety of potential appl...
Wei Shen, Ke Deng, Xiang Bai, Tommer Leyvand, Bain...
ICDM
2009
IEEE
112views Data Mining» more  ICDM 2009»
14 years 5 months ago
Spatio-temporal Multi-dimensional Relational Framework Trees
—The real world is composed of sets of objects that move and morph in both space and time. Useful concepts can be defined in terms of the complex interactions between the multi-...
Matthew Bodenhamer, Samuel Bleckley, Daniel Fennel...
IEEESP
2006
108views more  IEEESP 2006»
13 years 11 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven