Sciweavers

5693 search results - page 75 / 1139
» Socially relevant computing
Sort
View
PERCOM
2010
ACM
15 years 2 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han
147
Voted
CIKM
2008
Springer
15 years 5 months ago
Structural relevance: a common basis for the evaluation of structured document retrieval
This paper presents a unified framework for the evaluation of a range of structured document retrieval (SDR) approaches and tasks. The framework is based on a model of tree retrie...
Mir Sadek Ali, Mariano P. Consens, Gabriella Kazai...
ICMCS
2007
IEEE
126views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Learning from Relevance Feedback Sessions using a K-Nearest-Neighbor-Based Semantic Repository
This paper introduces a flexible learning approach for image retrieval with relevance feedback. A semantic repository is constructed offline by applying the k-nearest-neighborbase...
Matthew Royal, Ran Chang, Xiaojun Qi
ICSE
2010
IEEE-ACM
15 years 8 months ago
Customized awareness: recommending relevant external change events
It is often assumed that developers’ view of their system and its environment is always consistent with everyone else’s; in practice, this assumption can be false, as the deve...
Reid Holmes, Robert J. Walker
APLAS
2008
ACM
15 years 5 months ago
Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution
Abstract. Symbolic execution is a flexible and powerful, but computationally expensive technique to detect dynamic behaviors of a program. In this paper, we present a context-sensi...
Xin Li, Daryl Shannon, Indradeep Ghosh, Mizuhito O...