Sciweavers

14382 search results - page 2722 / 2877
» Time in Connectionist Models
Sort
View
99
Voted
ICML
2006
IEEE
16 years 4 months ago
Learning to impersonate
Consider Alice, who is interacting with Bob. Alice and Bob have some shared secret which helps Alice identify Bob-impersonators. Now consider Eve, who knows Alice and Bob, but doe...
Moni Naor, Guy N. Rothblum
WWW
2009
ACM
16 years 4 months ago
Collective privacy management in social networks
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression f...
Anna Cinzia Squicciarini, Mohamed Shehab, Federica...
132
Voted
WWW
2008
ACM
16 years 4 months ago
Optimal marketing strategies over social networks
We discuss the use of social networks in implementing viral marketing strategies. While influence maximization has been studied in this context (see Chapter 24 of [10]), we study ...
Jason D. Hartline, Vahab S. Mirrokni, Mukund Sunda...
WWW
2007
ACM
16 years 4 months ago
Optimized query planning of continuous aggregation queries in dynamic data dissemination networks
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Krithi Ramamritham
WWW
2007
ACM
16 years 4 months ago
The complex dynamics of collaborative tagging
The debate within the Web community over the optimal means by which to organize information often pits formalized classifications against distributed collaborative tagging systems...
Harry Halpin, Valentin Robu, Hana Shepherd
« Prev « First page 2722 / 2877 Last » Next »