Interactive Hierarchical Dimension Ordering, Spacing and Filtering
... is different from their approach in that we impose a hierarchical
structure over the dimensions to reduce the complexity of the ordering problem and allow efficient user interactions.
Dimension order is also important for many other fields. For instance, the database primitive similarity join has be ...
Outfitting an Inter-AS Topology to a Network of DDoS Countermeasures
... To evaluate the scalability of a DDoS countermeasure, such
an experimental environment is needed that is similar to the
real Internet for as long as possible. Of course, it is difficult to
construct an experimental network which has same size, same
facilities, and / or same characteristics of the re ...
Case-Based Reasoning
... multi-agent-system architectures in which CBR and its underlying methodology play a significant role.
CREEK 1 is an architecture for knowledge-intensive CBR,
which has been developed at the Norwegian University of Science and Technology and focuses on open and weak-theory domains. Within CREEK, the ...
User Interfaces and Mobile Web
... phones. Our goal is to understand how mobile search users differ
from computer-based search users, and we focus heavily on the
distribution and variability of tasks that users perform from each
platform. The results suggest that search usage is much more
focused for the average mobile user than for ...
Document
... the true user identifier should be impossible to recover, also by
application of a dictionary attack, when the algorithm of generating the
handle is known
user handles for one user, supplied to different SPs should be different,
in order to make it impossible to correlate data from several SPs and
c ...
Mining Personal Context-Aware Preferences for Mobile Users
... personalized context-aware user preferences. However, it
is still under-explored about how to mine context-aware
preferences from context-rich logs for developing contextaware recommender systems.
To this end, in this paper, we propose a novel approach
to mining personal context-aware preferences fr ...
A User Profile Derivation Approach based on Log
... • Prestige (p) describes how often a page is referenced by other pages and thus has a prominent role
in the graph of pages (see e.g. [12]).
These factors are weighted according the domain of
the information system for which user profiling is conducted, and the information available (see Section 3.2. ...
for Sublinear Time Maximum Inner Product Search (MIPS)
... images is the state-of-the-art in object detection tasks [8]. In DPM model, firstly a set of part filters
are learned from the training dataset. During detection, these learned filter activations over various
patches of the test image are used to score the test image. The activation of a filter on a ...
slides - University of Virginia
... Avoids adding another application to run and manage
Users can integrate Crosspoint into their existing and future projects without
undergoing a complete redesign.
...
Comparing mathematical provers - Institute for Computing and
... This proof is mentioned in Aristotle’s Prior Analytics, as follows [10]:
For all who argue per impossibile infer by syllogism a false conclusion, and
prove the original conclusion hypothetically when something impossible follows from a contradictory assumption, as, for example, that the diagonal [of ...
Project Presentations - 2
... How do advertisers know who are the best
people to advertise to?
Current method: Twitter’s built-in user targets
...
Radiocommunication Study Groups
... continuous atomic time scale based on TAI with simultaneous broadcasting these two reference timescales (current UTC and continuous atomic time scale) on equal basis.
However, practical implementation of Methods A and B seems difficult due to:
- in case of Method A the problems related to disseminat ...
Fact-finding Techniques
... application lifecycle. Crucial to the early
stages including database planning, system
definition, and requirements collection and
...
pptx
... and a class of servers S is a user strategy s.t.
for every server S in S and every initial state of
S and ENV, the user achieves G.(w.h.p.)
WE WILL SAY THAT THE UNIVERSAL
...
System Configuration - Millennium Software Solutions
... The Hungarian algorithm is a popular and efficient algorithm for (A1) and can be
adapted to solve (A2) as explained in . In our experiments, we use the Hungarian
algorithm for (A1) and a polynomial-time algorithm, based on the theory of
matroids (see, e.g., [33, Ch. 8]), for (A2). The timecomplexit ...
One-Class Matrix Completion with Low-Density
... settings inherently generate one-class (i.e., positive only)
datasets, since the knowledge required for labeling examples
as negative is typically not available explicitly and difficult
to collect. In such cases, the observed events are reliable
indicators of what the user liked. However, there is n ...
Spam and Anti-Spam Measures: A Look at Potential Impacts
... the same message, in an attempt to force the
message on people who would not otherwise
choose to receive it. Most spam is commercial
advertising, often for dubious products, getrich-quick schemes, or quasi-legal services.
Spam costs the sender very little to send-- most
of the costs are paid for by ...
A Personalized Recommendation System for NetEase Dating Site
... of candidates to the similar subjects. Halo et al.[23] consider the reciprocal interactions as an important factor in
recommendation. And a collaborative filtering based hybrid
algorithm was shown to have good performance in recommending for both one-way and mutual contacts.
When facing the cold sta ...
ppt
... Internet 2
Internet3
Access
Router
1:Control: TCP connection.
2:Control: web connections.
3:Data
...
Dealing With Concurrent Modifications Using REP++
... Concurrent modification challenge
Integrity problems due to concurrent modification of data occur in some cases at the level of
the information system itself, but in most cases at the level of operational procedures. For
instance, two users might receive a different address modification request f ...
Resetting The CIM \ EIM System “sa” Password Procedure
... 2. a. To verify user_name, and select user_id“save the results for backup.
b. “SELECT user_id, user_name, password, case_insensitive_password FROM
egpl_user WHERE user_id = 1”.
Note: Be sure to save query and results, so that it can be provided for
troubleshooting, if there is a problem.
3. a. For B ...
Amazon.com recommendations item-to
... purchased it.
Using collaborative filtering to generate recommendations is computationally expensive. It is
O(MN) in the worst case, where M is the number
of customers and N is the number of product catalog items, since it examines M customers and up
to N items for each customer. However, because
th ...
Recommender system
Recommender systems or recommendation systems (sometimes replacing ""system"" with a synonym such as platform or engine) are a subclass of information filtering system that seek to predict the 'rating' or 'preference' that a user would give to an item.Recommender systems have become extremely common in recent years, and are applied in a variety of applications. The most popular ones are probably movies, music, news, books, research articles, search queries, social tags, and products in general. However, there are also recommender systems for experts, jokes, restaurants, financial services, life insurance, persons (online dating), and Twitter followers.