Biblio

Found 7 results

2013
Senator, T. E., H. G. Goldberg, A. Memory, W. T. Young, B. Rees, R. Pierce, D. Huang, M. Reardon, D. A. Bader, E. Chow, et al., "Detecting insider threats in a real corporate database of computer usage activity", Proceedings of the 19th ACM SIGKDD Conference on Knowledge Discovery and Data Mining - KDD '13, Chicago, Illinois, ACM Press, pp. 1393, 08/2013. Abstract
2011
Wong, W. - K., I. Oberst, S. Das, T. Moore, S. Stumpf, K. McIntosh, and M. M. Burnett, "End-User Feature Labeling via Locally Weighted Logistic Regression", Twenty-Fifth AAAI Conference on Artificial Intelligence (NECTAR Track), San Francisco, CA, AAAI Press, 08/2011. Abstract
, , , 06/2011.
Kulesza, T., M. M. Burnett, S. Stumpf, W. - K. Wong, S. Das, A. Groce, A. Shinsel, F. Bice, and K. McIntosh, "Where are my intelligent assistant's mistakes? a systematic testing approach", Proceedings of the Third international conference on End-user development, Berlin, Heidelberg, Springer-Verlag, pp. 171–186, 06/2011. Abstract
, , , 02/2011.
Wong, W. - K., I. Oberst, S. Das, T. Moore, S. Stumpf, K. McIntosh, and M. M. Burnett, "End-user feature labeling", Proceedings of the 15th international conference on Intelligent user interfaces - IUI '11, Palo Alto, CA, ACM Press, pp. 115-124, 02/2011. Abstract

Best Paper Nominee