Sciweavers

6906 search results - page 1249 / 1382
» An algorithm for modelling key terms
Sort
View
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
13 years 13 days ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 12 days ago
eTrust: understanding trust evolution in an online world
Most existing research about online trust assumes static trust relations between users. As we are informed by social sciences, trust evolves as humans interact. Little work exists...
Jiliang Tang, Huan Liu, Huiji Gao, Atish Das Sarma...
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 12 days ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
CVPR
2012
IEEE
13 years 12 days ago
Curvature-based regularization for surface approximation
We propose an energy-based framework for approximating surfaces from a cloud of point measurements corrupted by noise and outliers. Our energy assigns a tangent plane to each (noi...
Carl Olsson, Yuri Boykov
ICFP
2012
ACM
13 years 11 days ago
Proof-producing synthesis of ML from higher-order logic
The higher-order logic found in proof assistants such as Coq and various HOL systems provides a convenient setting for the development and verification of pure functional program...
Magnus O. Myreen, Scott Owens
« Prev « First page 1249 / 1382 Last » Next »