Sciweavers

405 search results - page 54 / 81
» Avatar-centric Risk Evaluation
Sort
View
ICML
2008
IEEE
15 years 10 months ago
Stopping conditions for exact computation of leave-one-out error in support vector machines
We propose a new stopping condition for a Support Vector Machine (SVM) solver which precisely reflects the objective of the Leave-OneOut error computation. The stopping condition ...
Klaus-Robert Müller, Pavel Laskov, Vojtech Fr...
ICSE
2009
IEEE-ACM
15 years 10 months ago
Locating need-to-translate constant strings for software internationalization
Modern software applications require internationalization to be distributed to different regions of the world. In various situations, many software applications are not internatio...
Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu S...
WWW
2005
ACM
15 years 10 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
CHI
2007
ACM
15 years 10 months ago
Mobile interaction with visual and RFID tags: a field study on user perceptions
In this paper, we present a study of user perceptions on mobile interaction with visual and RFID tags. Although mobile interaction with tags has been proposed in several earlier s...
Dan Greenblatt, Jonna Häkkilä, Kaj M&aum...
EDBT
2008
ACM
146views Database» more  EDBT 2008»
15 years 9 months ago
Attribute selection in multivariate microaggregation
Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of...
Javier Herranz, Jordi Nin, Vicenç Torra