Sciweavers

4616 search results - page 682 / 924
» Extreme Components Analysis
Sort
View
RECSYS
2009
ACM
15 years 9 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
INFOCOM
2000
IEEE
15 years 8 months ago
Efficient Handoff Rerouting Algorithms: A Competitive On-Line Algorithmic Approach
—This paper considers the design of handoff rerouting algorithms for reducing the overall session cost in personal communication systems (PCS). Most modern communication systems ...
Yigal Bejerano, Israel Cidon, Joseph Naor
SIGDOC
2000
ACM
15 years 8 months ago
High-tech publications need old-fashioned editing
: Standard formats, familiar word choices, consistency, organization, simple graphic formats, technology, mechanics, and the global nature of the user and the media are major consi...
Janis Ramey, Marlene Miller
SIGDOC
2000
ACM
15 years 8 months ago
A why-what-how tool for development and documentation of operating procedures
∗ DSTOP, the Design Support Tool for Operating Procedures, is a relatively simple software tool for support of designers of new interfaces and their procedures for use. DSTOP is ...
David G. Novick
AVBPA
1997
Springer
100views Biometrics» more  AVBPA 1997»
15 years 8 months ago
Using Gait as a Biometric, via Phase-weighted Magnitude Spectra
Gait is a biometric which is subject to increasing interest. Current approaches include modelling gait as a spatio-temporal sequence and as an articulated model. By considering leg...
David Cunado, Mark S. Nixon, John N. Carter