Sciweavers

241 search results - page 39 / 49
» Recommendation to Groups
Sort
View
ICDM
2002
IEEE
109views Data Mining» more  ICDM 2002»
15 years 4 months ago
Using Text Mining to Infer Semantic Attributes for Retail Data Mining
Current Data Mining techniques usually do not have a mechanism to automatically infer semantic features inherent in the data being “mined”. The semantics are either injected i...
Rayid Ghani, Andrew E. Fano
CHI
2010
ACM
15 years 4 months ago
What's your idea?: a case study of a grassroots innovation pipeline within a large software company
Establishing a grassroots innovation pipeline has come to the fore as strategy for nurturing innovation within large organizations. A key element of such pipelines is the use of a...
Brian P. Bailey, Eric Horvitz
HUC
2009
Springer
15 years 4 months ago
Understanding file access mechanisms for embedded Ubicomp collaboration interfaces
This paper explores the nature of interfaces to support people in accessing their files at tabletop displays embedded in the environment. To do this, we designed a study comparin...
Anthony Collins, Anastasia Bezerianos, Gregor McEw...
PET
2010
Springer
15 years 3 months ago
How to Share Your Favourite Search Results while Preserving Privacy and Quality
Personalised social search is a promising avenue to increase the relevance of search engine results by making use of recommendations made by friends in a social network. More gener...
George Danezis, Tuomas Aura, Shuo Chen, Emre Kicim...
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
15 years 3 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...