Sciweavers

1782 search results - page 267 / 357
» Learning in Parallel Universes
Sort
View
CHI
2005
ACM
16 years 4 months ago
"I hear the pattern": interactive sonification of geographical data patterns
In this paper we describe our investigation of using interactive sonification (non-speech sound) to present the geographical distribution pattern of statistical data to vision imp...
Haixia Zhao, Catherine Plaisant, Ben Shneiderman
120
Voted
STOC
2003
ACM
110views Algorithms» more  STOC 2003»
16 years 4 months ago
New degree bounds for polynomial threshold functions
A real multivariate polynomial p(x1, . . . , xn) is said to sign-represent a Boolean function f : {0, 1}n {-1, 1} if the sign of p(x) equals f(x) for all inputs x {0, 1}n. We gi...
Ryan O'Donnell, Rocco A. Servedio
138
Voted
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
16 years 4 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu
CVPR
2010
IEEE
16 years 11 days ago
Reading Between The Lines: Object Localization Using Implicit Cues from Image Tags
Current uses of tagged images typically exploit only the most explicit information: the link between the nouns named and the objects present somewhere in the image. We propose to ...
Sung Ju Hwang, University of Texas, Kristen Grauma...
ESSOS
2009
Springer
15 years 10 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely