Sciweavers

8706 search results - page 1620 / 1742
» Learning Subjective Language
Sort
View
NOSSDAV
2010
Springer
15 years 8 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
126
Voted
ACMACE
2009
ACM
15 years 8 months ago
Critical gameplay
How do games effect the way we problem solve, socialize, or even view the world? When we shoot do we learn to destroy obstacles instead of work around them? Does the binary world ...
Lindsay Grace
152
Voted
RECSYS
2009
ACM
15 years 8 months ago
iTag: a personalized blog tagger
We present iTag, a personalized tag recommendation system for blogs. iTag improves on the state-of-the-art in tag recommendation systems in two ways. First, iTag has much higher p...
Michael Hart, Rob Johnson, Amanda Stent
146
Voted
CIKM
2009
Springer
15 years 8 months ago
Heterogeneous cross domain ranking in latent space
Traditional ranking mainly focuses on one type of data source, and effective modeling still relies on a sufficiently large number of labeled or supervised examples. However, in m...
Bo Wang, Jie Tang, Wei Fan, Songcan Chen, Zi Yang,...
144
Voted
CIKM
2009
Springer
15 years 8 months ago
An empirical study on using hidden markov model for search interface segmentation
This paper describes a hidden Markov model (HMM) based approach to perform search interface segmentation. Automatic processing of an interface is a must to access the invisible co...
Ritu Khare, Yuan An
« Prev « First page 1620 / 1742 Last » Next »