Sciweavers

RECSYS
2015
ACM
8 years 1 months ago
Preference-oriented Social Networks: Group Recommendation and Inference
Social networks facilitate a variety of social, economic, and political interactions. Homophily and social influence suggest that preferences (e.g., over products, services, poli...
Amirali Salehi-Abari, Craig Boutilier
RECSYS
2015
ACM
8 years 1 months ago
Good Times Bad Times: A Study on Recency Effects in Collaborative Filtering for Social Tagging
In this paper, we present work-in-progress of a recently started project that aims at studying the effect of time in recommender systems in the context of social tagging, consolid...
Santiago Larrain, Christoph Trattner, Denis Parra,...
RECSYS
2015
ACM
8 years 1 months ago
Location-Aware Recommendation Systems: Where We Are and Where We Recommend to Go
Recommendation systems have been successfully used to provide items of interest to the users (e.g., movies, music, books, news, images). However, traditional recommendation system...
María del Carmen Rodríguez-Hern&aacu...
MIA
2016
8 years 1 months ago
Skin lesion tracking using structured graphical models
An automatic pigmented skin lesions tracking system, which is important for early skin cancer detection, is proposed in this work. The input to the system is a pair of skin back i...
Hengameh Mirzaalian, Tim K. Lee, Ghassan Hamarneh
MIA
2016
8 years 1 months ago
Multi-oriented windowed harmonic phase reconstruction for robust cardiac strain imaging
The purpose of this work is to develop a method for direct estimation of the cardiac strain tensor by extending the harmonic phase reconstruction on tagged magnetic resonance imag...
Lucilio Cordero-Grande, Javier Royuela-del-Val, Sa...
HF
2016
8 years 1 months ago
Boredom in the Workplace: A New Look at an Old Problem
Mary L. Cummings, Fei Gao, Kris M. Thornburg
HEURISTICS
2016
8 years 1 months ago
Proximity Benders: a decomposition heuristic for stochastic programs
is eventually found and the method terminates. As convergence may require a large amount of computing time for hard instances, the method unsatisfactory from a heuristic point of ...
Natashia Boland, Matteo Fischetti, Michele Monaci,...
HEURISTICS
2016
8 years 1 months ago
Exploiting subproblem optimization in SAT-based MaxSAT algorithms
Carlos Ansótegui, Joel Gabàs, Jordi ...
HASE
2016
IEEE
8 years 1 months ago
Game Theory with Learning for Cyber Security Monitoring
Abstract—Recent attacks show that threats to cyber infrastructure are not only increasing in volume, but are getting more sophisticated. The attacks may comprise multiple actions...
Key-whan Chung, Charles A. Kamhoua, Kevin A. Kwiat...
HASE
2016
IEEE
8 years 1 months ago
Safe Multi-objective Planning with a Posteriori Preferences
—Autonomous planning in safety critical systems is a difficult task where decisions must carefully balance optimisation for performance goals of the system while also keeping th...
Ralph Eastwood, Robert Alexander, Tim Kelly