Sciweavers

405 search results - page 54 / 81
» Avatar-centric Risk Evaluation
Sort
View
ICML
2008
IEEE
16 years 18 days ago
Stopping conditions for exact computation of leave-one-out error in support vector machines
We propose a new stopping condition for a Support Vector Machine (SVM) solver which precisely reflects the objective of the Leave-OneOut error computation. The stopping condition ...
Klaus-Robert Müller, Pavel Laskov, Vojtech Fr...
ICSE
2009
IEEE-ACM
16 years 18 days ago
Locating need-to-translate constant strings for software internationalization
Modern software applications require internationalization to be distributed to different regions of the world. In various situations, many software applications are not internatio...
Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu S...
WWW
2005
ACM
16 years 14 days ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
CHI
2007
ACM
16 years 6 days ago
Mobile interaction with visual and RFID tags: a field study on user perceptions
In this paper, we present a study of user perceptions on mobile interaction with visual and RFID tags. Although mobile interaction with tags has been proposed in several earlier s...
Dan Greenblatt, Jonna Häkkilä, Kaj M&aum...
EDBT
2008
ACM
146views Database» more  EDBT 2008»
15 years 12 months ago
Attribute selection in multivariate microaggregation
Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of...
Javier Herranz, Jordi Nin, Vicenç Torra