Sciweavers

376 search results - page 63 / 76
» Evaluating a computational model of social causality and res...
Sort
View
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
MM
2010
ACM
271views Multimedia» more  MM 2010»
14 years 7 months ago
Large-scale music tag recommendation with explicit multiple attributes
Social tagging can provide rich semantic information for largescale retrieval in music discovery. Such collaborative intelligence, however, also generates a high degree of tags un...
Zhendong Zhao, Xinxi Wang, Qiaoliang Xiang, Andy M...
100
Voted
ASSETS
2010
ACM
14 years 4 months ago
Broadening accessibility through special interests: a new approach for software customization
Individuals diagnosed with autism spectrum disorder (ASD) often fixate on narrow, restricted interests. These interests can be highly motivating, but they can also create attentio...
Robert R. Morris, Connor R. Kirschbaum, Rosalind W...
IPPS
2003
IEEE
15 years 2 months ago
Homeostatic and Tendency-Based CPU Load Predictions
The dynamic nature of a resource-sharing environment means that applications must be able to adapt their behavior in response to changes in system status. Predictions of future sy...
Lingyun Yang, Ian T. Foster, Jennifer M. Schopf
CVPR
2010
IEEE
15 years 5 months ago
Learning Mid-Level Features For Recognition
Many successful models for scene or object recognition transform low-level descriptors (such as Gabor filter responses, or SIFT descriptors) into richer representations of interme...
Y-Lan Boureau, Francis Bach, Yann LeCun, Jean Ponc...