Sciweavers

3471 search results - page 647 / 695
» User activity histories
Sort
View
EDBT
2008
ACM
161views Database» more  EDBT 2008»
14 years 11 months ago
Automatic content targeting on mobile phones
The mobile phone industry has reached a saturation point. With low growth rates and fewer new customers available to acquire, competition among mobile operators is now focused on ...
Giovanni Giuffrida, Catarina Sismeiro, Giuseppe Tr...
IMC
2007
ACM
14 years 11 months ago
Legal issues surrounding monitoring during network research
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Atto...
Douglas C. Sicker, Paul Ohm, Dirk Grunwald
DAGSTUHL
2007
14 years 11 months ago
Integrated Human Behavior Modeling
In order to prevent emergencies or critical situations where humans are the origin, a timely provision of information thus obtained for the coordinating services and the on-site st...
Michael Berger, Dagmar Beyer, Stephan Prueckner
ECIR
2007
Springer
14 years 11 months ago
Enhancing Expert Search Through Query Modeling
An expert finding is a very common task among enterprise search activities, while its usual retrieval performance is far from the quality of the Web search. Query modeling helps t...
Pavel Serdyukov, Sergey Chernov, Wolfgang Nejdl
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
14 years 11 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny