Search Results for ''

published presentations and documents on DocSlides.

Modeling and Detecting Anomalous Topic Access
Modeling and Detecting Anomalous Topic Access
by yoshiko-marsland
Siddharth Gupta. 1. , Casey Hanson. 2. , Carl A G...
Inferring User Interest Familiarity and Topic Similarity wi
Inferring User Interest Familiarity and Topic Similarity wi
by debby-jeon
Instructor: . Dongchul. . kim. Anusha boothpur. ...
Inferring User Interest Familiarity and Topic Similarity wi
Inferring User Interest Familiarity and Topic Similarity wi
by tawny-fly
Department of Computer Science, KAIST. Dabi Ahn, ...
Multiple Domain User Personalization
Multiple Domain User Personalization
by min-jolicoeur
Deepak . Agarwal. Yahoo! Research. Yucheng Low . ...
Topic Hierarchy Construction for the Organization of Multi-Source User Generated
Topic Hierarchy Construction for the Organization of Multi-Source User Generated
by pasty-toler
Contents. Date. . :. . 2013/09/17. Source. . :...
Unifying Topic, Sentiment & Preference
Unifying Topic, Sentiment & Preference
by phoebe-click
in an HDP-Based Rating Regression Model for Onlin...
Empirical Study of Topic Modeling in Twitter
Empirical Study of Topic Modeling in Twitter
by lois-ondreau
Liangjie Hong. and Brian D. Davison. Computer Sc...
Collaborative  Portal Security
Collaborative Portal Security
by alexa-scheidler
Prof. Steven A. Demurjian, Sr. . Computer Science...
Automatic Construction of
Automatic Construction of
by trish-goza
Topic . Maps for Navigation in Information Space ...
Automatic Construction of
Automatic Construction of
by danika-pritchard
Topic . Maps for Navigation in Information Space ...
Linear
Linear
by luanne-stotts
Submodular. Bandits . and their Application to D...
Measuring User Influence in Twitter: The Million Follower F
Measuring User Influence in Twitter: The Million Follower F
by jane-oiler
Meeyoung . Cha Hamed Haddadi ...
mit  human-computer interaction
mit human-computer interaction
by faustina-dinatale
Jilin Chen. university of . minnesota. eddi. Inte...
Trends in Social Network
Trends in Social Network
by luanne-stotts
M. Tech Project Presentation . By :. Pranay. . ...
mit  human-computer interaction
mit human-computer interaction
by alexa-scheidler
Jilin Chen. university of . minnesota. eddi. Inte...
Trends in Social Network
Trends in Social Network
by olivia-moreira
M. Tech Project Presentation . By :. Pranay. . ...
Hierarchical Exploration for Accelerating Contextual Bandit
Hierarchical Exploration for Accelerating Contextual Bandit
by sherrill-nordquist
Yisong Yue . Carnegie Mellon University. Joint wo...
Hierarchical Exploration for Accelerating Contextual Bandit
Hierarchical Exploration for Accelerating Contextual Bandit
by min-jolicoeur
Yisong Yue . Carnegie Mellon University. Joint wo...
Personalized Celebrity Video Search Based on Cross-space Mining
Personalized Celebrity Video Search Based on Cross-space Mining
by kittie-lecroy
1. Zhengyu Deng, Jitao . Sang, Changsheng Xu . 2....
Validating
Validating
by kittie-lecroy
EMR . Audit . Automation. Carl A. Gunter. Univers...
PhD title:
PhD title:
by kittie-lecroy
“. Stakeholder perceptions on the value of car ...
Information
Information
by lindy-dunigan
Retrieval . to Knowledge . Retrieval. , one more ...
FaitCrowd
FaitCrowd
by calandra-battersby
: Fine Grained Truth Discovery for . Crowdsourced...
A Comparative Study of Users’
A Comparative Study of Users’
by tatyana-admore
Microblogging. Behavior on Sina Weibo and Twitte...
Optimizing Recommender Systems as a
Optimizing Recommender Systems as a
by mitsue-stanley
Submodular. Bandits Problem. Yisong Yue. Carnegi...
Discuss the use of software-based training methods
Discuss the use of software-based training methods
by min-jolicoeur
3.3.4. The aim of this presentation. As this is a...
Fast Mining and
Fast Mining and
by liane-varnes
Forecasting of Complex Time-Stamped Events. Yasuk...
A Study of Grayware on Google Play
A Study of Grayware on Google Play
by pamella-moone
Benjamin Andow*, . Adwait. . Nadkarni. *, Blake ...
1 Topic 1:  Introduction
1 Topic 1: Introduction
by luanne-stotts
COS 320. Compiling Techniques. Princeton Universi...
S kills : create, modify and post to a blog
S kills : create, modify and post to a blog
by tawny-fly
C. oncepts. : tabbed navigation, wire-frame diagr...
1 Topic 1:  Introduction
1 Topic 1: Introduction
by kittie-lecroy
COS 320. Compiling Techniques. Princeton Universi...
Content Management & Hashtag Recommendation
Content Management & Hashtag Recommendation
by yieldpampers
IN. P2P OSN. By . Keerthi Nelaturu. Challenges wit...
Topic:  Expert Systems CS6659 Artificial Intelligence
Topic: Expert Systems CS6659 Artificial Intelligence
by holly
III YEAR VI. SEM. Presented by,. . Ms. M. . Rup...
Ask the Microsoft Infrastructure Team
Ask the Microsoft Infrastructure Team
by teresa
October 2017. Nathan Dors, service owner. Brian Ar...