Sciweavers

5275 search results - page 986 / 1055
» Computing by observing
Sort
View
SIGIR
2009
ACM
15 years 6 months ago
Learning to recommend with social trust ensemble
As an indispensable technique in the field of Information Filtering, Recommender System has been well studied and developed both in academia and in industry recently. However, mo...
Hao Ma, Irwin King, Michael R. Lyu
SOUPS
2009
ACM
15 years 6 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov
VRST
2009
ACM
15 years 6 months ago
Gaze behavior and visual attention model when turning in virtual environments
In this paper we analyze and try to predict the gaze behavior of users navigating in virtual environments. We focus on first-person navigation in virtual environments which invol...
Sébastien Hillaire, Anatole Lécuyer,...
ACSAC
2008
IEEE
15 years 6 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
CSSE
2008
IEEE
15 years 6 months ago
Stochastic Gradient Algorithm for Multi-input Systems Based on the Auxiliary Model
—This paper presents an auxiliary model based stochastic gradient parameter estimation algorithm for multiinput output-error systems by minimizing a quadratic cost function. The ...
Yuwu Liao, Xianfang Wang, Rui Feng Ding