Sciweavers

1512 search results - page 249 / 303
» Towards the Personalization of Algorithms Evaluation in Data...
Sort
View
DSS
2007
96views more  DSS 2007»
14 years 9 months ago
Factors relating to the decision to click on a sponsored link
In this paper, we report results of an investigation into the factors influencing the selection of sponsored links by e-commerce Web searchers. In this research, 56 participants e...
Bernard J. Jansen, Anna Brown, Marc Resnick
WWW
2007
ACM
15 years 10 months ago
Modeling user behavior in recommender systems based on maximum entropy
We propose a model for user purchase behavior in online stores that provide recommendation services. We model the purchase probability given recommendations for each user based on...
Tomoharu Iwata, Kazumi Saito, Takeshi Yamada
DEXA
2004
Springer
91views Database» more  DEXA 2004»
15 years 1 months ago
Efficient Processing of Distributed Iceberg Semi-joins
The Iceberg SemiJoin (ISJ) of two datasets R and S returns the tuples in R which join with at least k tuples of S. The ISJ operator is essential in many practical applications incl...
Mohammed Kasim Imthiyaz, Dong Xiaoan, Panos Kalnis
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
15 years 10 months ago
Efficient methods for topic model inference on streaming document collections
Topic models provide a powerful tool for analyzing large text collections by representing high dimensional data in a low dimensional subspace. Fitting a topic model given a set of...
Limin Yao, David M. Mimno, Andrew McCallum
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
15 years 10 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan