Sciweavers

390 search results - page 54 / 78
» Using Temporal Data for Making Recommendations
Sort
View
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
12 years 12 months ago
Transparent user models for personalization
Personalization is a ubiquitous phenomenon in our daily online experience. While such technology is critical for helping us combat the overload of information we face, in many cas...
Khalid El-Arini, Ulrich Paquet, Ralf Herbrich, Jur...
VLDB
2004
ACM
123views Database» more  VLDB 2004»
15 years 2 months ago
CORDS: Automatic Generation of Correlation Statistics in DB2
When query optimizers erroneously assume that database columns are statistically independent, they can underestimate the selectivities of conjunctive predicates by orders of magni...
Ihab F. Ilyas, Volker Markl, Peter J. Haas, Paul G...
71
Voted
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
15 years 1 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
TASLP
2008
176views more  TASLP 2008»
14 years 9 months ago
Analysis of Minimum Distances in High-Dimensional Musical Spaces
Abstract--We propose an automatic method for measuring content-based music similarity, enhancing the current generation of music search engines and recommender systems. Many previo...
Michael Casey, Christophe Rhodes, Malcolm Slaney
61
Voted
IV
2009
IEEE
141views Visualization» more  IV 2009»
15 years 4 months ago
VioNeS - Visual Support for the Analysis of the Next Sub-volume Method
Computational simulation is an established method to gain insight into cellular processes. As the resulting data sets are usually large and complex, visualization can play a signi...
Andrea Unger, Enrico Gutzeit, Matthias Jeschke, He...