Sciweavers

4052 search results - page 49 / 811
» Computing personalized pageranks
Sort
View
CHI
2009
ACM
15 years 4 months ago
Towards improving mental models of personal firewall users
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
COLING
2010
14 years 6 months ago
Bipolar Person Name Identification of Topic Documents Using Principal Component Analysis
In this paper, we propose an unsupervised approach for identifying bipolar person names in a set of topic documents. We employ principal component analysis (PCA) to discover bipol...
Chien Chin Chen, Chen-Yuan Wu
DEBU
1998
95views more  DEBU 1998»
14 years 11 months ago
What can you do with a Web in your Pocket?
The amount of information available online has grown enormously over the past decade. Fortunately, computing power, disk capacity, and network bandwidth have also increased dramat...
Sergey Brin, Rajeev Motwani, Lawrence Page, Terry ...
PERCOM
2009
ACM
16 years 13 days ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
CCS
2008
ACM
15 years 1 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal