Sciweavers

5063 search results - page 188 / 1013
» Personalized Data Set for Analysis
Sort
View
SIGSOFT
2003
ACM
16 years 5 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
STOC
2004
ACM
145views Algorithms» more  STOC 2004»
16 years 5 months ago
Using mixture models for collaborative filtering
A collaborative filtering system at an e-commerce site or similar service uses data about aggregate user behavior to make recommendations tailored to specific user interests. We d...
Jon M. Kleinberg, Mark Sandler
DOCENG
2008
ACM
15 years 6 months ago
An exploratory mapping strategy for web-driven magazines
"There will always (I hope) be print books, but just as the advent of photography changed the role of painting or film changed the role of theater in our culture, electronic ...
Fabio Giannetti
CIKM
2010
Springer
15 years 3 months ago
Generating advertising keywords from video content
With the proliferation of online distribution methods for videos, content owners require easier and more effective methods for monetization through advertising. Matching advertis...
Michael J. Welch, Junghoo Cho, Walter Chang
PAKDD
2005
ACM
184views Data Mining» more  PAKDD 2005»
15 years 10 months ago
Adjusting Mixture Weights of Gaussian Mixture Model via Regularized Probabilistic Latent Semantic Analysis
Mixture models, such as Gaussian Mixture Model, have been widely used in many applications for modeling data. Gaussian mixture model (GMM) assumes that data points are generated fr...
Luo Si, Rong Jin