Sciweavers

1931 search results - page 322 / 387
» Why we blog
Sort
View
DKE
2002
137views more  DKE 2002»
14 years 11 months ago
Reasoning for Web document associations and its applications in site map construction
Recently, there is an interest in using associations between web pages in providing users with pages relevant to what they are currently viewing. We believe that, to enable intell...
K. Selçuk Candan, Wen-Syan Li
IEEECIT
2010
IEEE
14 years 10 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
CORR
2011
Springer
215views Education» more  CORR 2011»
14 years 3 months ago
The Bethe Permanent of a Non-Negative Matrix
:  The Bethe Permanent of a Non-Negative Matrix Pascal O. Vontobel HP Laboratories HPL-2011-116 Bethe approximation; Bethe permanent; graph cover; partition function; perfect ma...
Pascal O. Vontobel
HUC
2011
Springer
13 years 11 months ago
Understanding my data, myself: supporting self-reflection with ubicomp technologies
We live in a world where many kinds of data about us can be collected and more will be collected as Ubicomp technologies mature. People reflect on this data using different tools ...
Ian Li, Anind K. Dey, Jodi Forlizzi
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 2 months ago
Searching and mining trillions of time series subsequences under dynamic time warping
Most time series data mining algorithms use similarity search as a core subroutine, and thus the time taken for similarity search is the bottleneck for virtually all time series d...
Thanawin Rakthanmanon, Bilson J. L. Campana, Abdul...