Sciweavers

8655 search results - page 1498 / 1731
» Challenges for Trusted Computing
Sort
View
SIGIR
2012
ACM
13 years 1 months ago
TFMAP: optimizing MAP for top-n context-aware recommendation
In this paper, we tackle the problem of top-N context-aware recommendation for implicit feedback scenarios. We frame this challenge as a ranking problem in collaborative filterin...
Yue Shi, Alexandros Karatzoglou, Linas Baltrunas, ...
CVPR
2012
IEEE
13 years 1 months ago
View invariant human action recognition using histograms of 3D joints
In this paper, we present a novel approach for human action recognition with histograms of 3D joint locations (HOJ3D) as a compact representation of postures. We extract the 3D sk...
Lu Xia, Chia-Chih Chen, J. K. Aggarwal
SDM
2012
SIAM
247views Data Mining» more  SDM 2012»
13 years 1 months ago
Simplex Distributions for Embedding Data Matrices over Time
Early stress recognition is of great relevance in precision plant protection. Pre-symptomatic water stress detection is of particular interest, ultimately helping to meet the chal...
Kristian Kersting, Mirwaes Wahabzada, Christoph R&...
EDBT
2012
ACM
257views Database» more  EDBT 2012»
13 years 1 months ago
Indexing and mining topological patterns for drug discovery
Increased availability of large repositories of chemical compounds has created new challenges and opportunities for the application of data-mining and indexing techniques to probl...
Sayan Ranu, Ambuj K. Singh
ISI
2008
Springer
14 years 11 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
« Prev « First page 1498 / 1731 Last » Next »