Sciweavers

18155 search results - page 3376 / 3631
» Point
Sort
View
SIGIR
2010
ACM
15 years 8 months ago
Proximity-based opinion retrieval
Blog post opinion retrieval aims at finding blog posts that are relevant and opinionated about a user’s query. In this paper we propose a simple probabilistic model for assigni...
Shima Gerani, Mark James Carman, Fabio Crestani
SP
2010
IEEE
327views Security Privacy» more  SP 2010»
15 years 8 months ago
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow
– With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is split...
Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang
136
Voted
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
15 years 8 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
140
Voted
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 8 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
GECCO
2007
Springer
212views Optimization» more  GECCO 2007»
15 years 8 months ago
Controlling overfitting with multi-objective support vector machines
Recently, evolutionary computation has been successfully integrated into statistical learning methods. A Support Vector Machine (SVM) using evolution strategies for its optimizati...
Ingo Mierswa
« Prev « First page 3376 / 3631 Last » Next »