Sciweavers

2705 search results - page 471 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
KDD
2010
ACM
289views Data Mining» more  KDD 2010»
14 years 11 months ago
Exploitation and exploration in a performance based contextual advertising system
The dynamic marketplace in online advertising calls for ranking systems that are optimized to consistently promote and capitalize better performing ads. The streaming nature of on...
Wei Li 0010, Xuerui Wang, Ruofei Zhang, Ying Cui, ...
CCS
2007
ACM
15 years 8 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...
121
Voted
WWW
2008
ACM
16 years 2 months ago
User oriented link function classification
Currently most link-related applications treat all links in the same web page to be identical. One link-related application usually requires one certain property of hyperlinks but...
Mingliang Zhu, Weiming Hu, Ou Wu, Xi Li, Xiaoqin Z...
95
Voted
COGSCI
2010
134views more  COGSCI 2010»
15 years 2 months ago
A Model of Knower-Level Behavior in Number Concept Development
We develop and evaluate a model of behavior on the Give-N task, a commonly used measure of young children's number knowledge. Our model uses the knower-level theory of how ch...
Michael D. Lee, Barbara W. Sarnecka
OOPSLA
2005
Springer
15 years 7 months ago
Micro patterns in Java code
Micro patterns are similar to design patterns, except that micro patterns stand at a lower, closer to the implementation, level of abstraction. Micro patterns are also unique in t...
Joseph Gil, Itay Maman