Sciweavers

753 search results - page 104 / 151
» Statistical Measurement of Information Leakage
Sort
View
105
Voted
MM
2009
ACM
147views Multimedia» more  MM 2009»
15 years 5 months ago
Wearing a YouTube hat: directors, comedians, gurus, and user aggregated behavior
While existing studies on YouTube’s massive user-generated video content have mostly focused on the analysis of videos, their characteristics, and network properties, little att...
Joan-Isaac Biel, Daniel Gatica-Perez
ECML
2001
Springer
15 years 5 months ago
Mining the Web for Synonyms: PMI-IR versus LSA on TOEFL
Abstract. This paper presents a simple unsupervised learning algorithm for recognizing synonyms, based on statistical data acquired by querying a Web search engine. The algorithm, ...
Peter D. Turney
INFOVIS
2000
IEEE
15 years 5 months ago
Visualizing Sequential Patterns for Text Mining
A sequential pattern in data mining is a finite series of elements such as A → B → C → D where A, B, C, and D are elements of the same domain. The mining of sequential patte...
Pak Chung Wong, Wendy Cowley, Harlan Foote, Elizab...
APGV
2008
ACM
149views Visualization» more  APGV 2008»
15 years 2 months ago
HMD calibration and its effects on distance judgments
Most head-mounted displays (HMDs) suffer from substantial optical distortion, and vendor-supplied specifications for field-of-view often are at variance with reality. Such display...
Scott A. Kuhl, William B. Thompson, Sarah H. Creem...
INFOSCALE
2007
ACM
15 years 2 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü