Sciweavers

1042 search results - page 159 / 209
» Representing real numbers in a generalized numeration system
Sort
View
KDD
2010
ACM
188views Data Mining» more  KDD 2010»
14 years 11 months ago
Trust network inference for online rating data using generative models
In an online rating system, raters assign ratings to objects contributed by other users. In addition, raters can develop trust and distrust on object contributors depending on a f...
Freddy Chong Tat Chua, Ee-Peng Lim
ICASSP
2011
IEEE
14 years 5 months ago
Effective background data selection in SVM speaker recognition for unseen test environment: More is not always better
This study focuses on determining a procedure to select effective negative examples for development of improved Support Vector Machine (SVM) based speaker recognition. Selection o...
Jun-Won Suh, Yun Lei, Wooil Kim, John H. L. Hansen
SAC
2011
ACM
14 years 4 months ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
ASPLOS
2012
ACM
13 years 9 months ago
Path-exploration lifting: hi-fi tests for lo-fi emulators
Processor emulators are widely used to provide isolation and instrumentation of binary software. However they have proved difficult to implement correctly: processor specificati...
Lorenzo Martignoni, Stephen McCamant, Pongsin Poos...
106
Voted
CIKM
2009
Springer
15 years 8 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau