Sciweavers

3686 search results - page 735 / 738
» Comprehensive comprehensions
Sort
View
99
Voted
SIGIR
2012
ACM
13 years 1 months ago
Predicting the ratings of multimedia items for making personalized recommendations
Existing multimedia recommenders suggest a specific type of multimedia items rather than items of different types personalized for a user based on his/her preference. Assume tha...
Rani Qumsiyeh, Yiu-Kai Ng
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
13 years 1 months ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan
114
Voted
EDBT
2012
ACM
225views Database» more  EDBT 2012»
13 years 1 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
ICSE
2012
IEEE-ACM
13 years 1 months ago
On the naturalness of software
—Natural languages like English are rich, complex, and powerful. The highly creative and graceful use of languages like English and Tamil, by masters like Shakespeare and Avvaiya...
Abram Hindle, Earl T. Barr, Zhendong Su, Mark Gabe...
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
15 years 11 months ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny