Sciweavers

1807 search results - page 329 / 362
» Backdoors in the Context of Learning
Sort
View
164
Voted
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
14 years 4 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
93
Voted
CHI
2011
ACM
14 years 4 months ago
Brick by brick: iterating interventions to bridge the achievement gap with virtual peers
We lay out one strand of a continuing investigation into the development of a virtual peer to help children learn to use “school English” and “school-ratified science talk...
Emilee Rader, Margaret Echelbarger, Justine Cassel...
180
Voted
DSS
2011
14 years 4 months ago
Estimating the effect of word of mouth on churn and cross-buying in the mobile phone market with Markov logic networks
Abstract: Much has been written about word of mouth and customer behavior. Telephone call detail records provide a novel way to understand the strength of the relationship between ...
Torsten Dierkes, Martin Bichler, Ramayya Krishnan
SIGECOM
2011
ACM
249views ECommerce» more  SIGECOM 2011»
14 years 3 months ago
Leading dynamics to good behavior
: Many natural games can have a dramatic difference between the quality of their best and worst Nash equilibria, even in pure strategies. Yet, nearly all work to date on dynamics s...
Maria-Florina Balcan
117
Voted
ICCV
2011
IEEE
14 years 23 days ago
Domain Adaptation for Object Recognition: An Unsupervised Approach
Adapting the classifier trained on a source domain to recognize instances from a new target domain is an important problem that is receiving recent attention. In this paper, we p...
Raghuraman Gopalan, Ruonan Li, Rama Chellappa