Sciweavers

8479 search results - page 1587 / 1696
» Data Extraction from Web Data Sources
Sort
View
SDM
2012
SIAM
281views Data Mining» more  SDM 2012»
13 years 5 months ago
Contextual Collaborative Filtering via Hierarchical Matrix Factorization
Matrix factorization (MF) has been demonstrated to be one of the most competitive techniques for collaborative filtering. However, state-of-the-art MFs do not consider contextual...
ErHeng Zhong, Wei Fan, Qiang Yang
CVPR
1999
IEEE
16 years 5 months ago
Background Estimation and Removal Based on Range and Color
Background estimation and removal based on the joint use of range and color data produces superior results than can be achieved with either data source alone. This is increasingly...
Gaile G. Gordon, Trevor Darrell, Michael Harville,...
CCS
2009
ACM
15 years 10 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
ISBRA
2009
Springer
15 years 10 months ago
Imputation-Based Local Ancestry Inference in Admixed Populations
Abstract. Accurate inference of local ancestry from whole-genome genetic variation data is critical for understanding the history of admixed human populations and detecting SNPs as...
Bogdan Pasaniuc, Justin Kennedy, Ion I. Mandoiu
DIMVA
2010
15 years 4 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
« Prev « First page 1587 / 1696 Last » Next »