Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
Modeling and Detecting Anomalous Topic Access
by yoshiko-marsland
Siddharth Gupta. 1. , Casey Hanson. 2. , Carl A G...
Inferring User Interest Familiarity and Topic Similarity wi
by debby-jeon
Instructor: . Dongchul. . kim. Anusha boothpur. ...
Inferring User Interest Familiarity and Topic Similarity wi
by tawny-fly
Department of Computer Science, KAIST. Dabi Ahn, ...
Multiple Domain User Personalization
by min-jolicoeur
Deepak . Agarwal. Yahoo! Research. Yucheng Low . ...
Topic Hierarchy Construction for the Organization of Multi-Source User Generated
by pasty-toler
Contents. Date. . :. . 2013/09/17. Source. . :...
Unifying Topic, Sentiment & Preference
by phoebe-click
in an HDP-Based Rating Regression Model for Onlin...
Empirical Study of Topic Modeling in Twitter
by lois-ondreau
Liangjie Hong. and Brian D. Davison. Computer Sc...
Collaborative Portal Security
by alexa-scheidler
Prof. Steven A. Demurjian, Sr. . Computer Science...
Automatic Construction of
by trish-goza
Topic . Maps for Navigation in Information Space ...
Automatic Construction of
by danika-pritchard
Topic . Maps for Navigation in Information Space ...
Linear
by luanne-stotts
Submodular. Bandits . and their Application to D...
Measuring User Influence in Twitter: The Million Follower F
by jane-oiler
Meeyoung . Cha Hamed Haddadi ...
mit human-computer interaction
by faustina-dinatale
Jilin Chen. university of . minnesota. eddi. Inte...
Trends in Social Network
by luanne-stotts
M. Tech Project Presentation . By :. Pranay. . ...
mit human-computer interaction
by alexa-scheidler
Jilin Chen. university of . minnesota. eddi. Inte...
Trends in Social Network
by olivia-moreira
M. Tech Project Presentation . By :. Pranay. . ...
Hierarchical Exploration for Accelerating Contextual Bandit
by sherrill-nordquist
Yisong Yue . Carnegie Mellon University. Joint wo...
Hierarchical Exploration for Accelerating Contextual Bandit
by min-jolicoeur
Yisong Yue . Carnegie Mellon University. Joint wo...
Personalized Celebrity Video Search Based on Cross-space Mining
by kittie-lecroy
1. Zhengyu Deng, Jitao . Sang, Changsheng Xu . 2....
Validating
by kittie-lecroy
EMR . Audit . Automation. Carl A. Gunter. Univers...
PhD title:
by kittie-lecroy
“. Stakeholder perceptions on the value of car ...
Information
by lindy-dunigan
Retrieval . to Knowledge . Retrieval. , one more ...
FaitCrowd
by calandra-battersby
: Fine Grained Truth Discovery for . Crowdsourced...
A Comparative Study of Users’
by tatyana-admore
Microblogging. Behavior on Sina Weibo and Twitte...
Optimizing Recommender Systems as a
by mitsue-stanley
Submodular. Bandits Problem. Yisong Yue. Carnegi...
Discuss the use of software-based training methods
by min-jolicoeur
3.3.4. The aim of this presentation. As this is a...
Fast Mining and
by liane-varnes
Forecasting of Complex Time-Stamped Events. Yasuk...
Installation Instructions Compact IO End CapsTerminators Catalog Numbers ECL ECR About the End CapsTerminators Topic Page Important User Information Environment and Enclosure North American Hazard
by alexa-scheidler
Safety Guidelines for the Application Installatio...
A Study of Grayware on Google Play
by pamella-moone
Benjamin Andow*, . Adwait. . Nadkarni. *, Blake ...
1 Topic 1: Introduction
by luanne-stotts
COS 320. Compiling Techniques. Princeton Universi...
S kills : create, modify and post to a blog
by tawny-fly
C. oncepts. : tabbed navigation, wire-frame diagr...
1 Topic 1: Introduction
by kittie-lecroy
COS 320. Compiling Techniques. Princeton Universi...
Content Management & Hashtag Recommendation
by yieldpampers
IN. P2P OSN. By . Keerthi Nelaturu. Challenges wit...
Topic: Expert Systems CS6659 Artificial Intelligence
by holly
III YEAR VI. SEM. Presented by,. . Ms. M. . Rup...
Ask the Microsoft Infrastructure Team
by teresa
October 2017. Nathan Dors, service owner. Brian Ar...
Load More...