Filters








8 Hits in 8.1 sec

User Response Prediction in Online Advertising [article]

Zhabiz Gharibshah, Xingquan Zhu
2021 arXiv   pre-print
What are the parties involved in the online digital advertising eco-systems? What type of data are available for user response prediction?  ...  Recent years have witnessed a significant increase in the number of studies using computational approaches, including machine learning methods, for user response prediction.  ...  There are some studies experimenting a model to address the impact of ads quality for predicting user response and user engagement, based on in-app advertising such as Yahoo Gemini platform [9, 67] .  ... 
arXiv:2101.02342v2 fatcat:clgefamcd5fmbeg5ephizy3zqu

Improving Post-Click User Engagement on Native Ads via Survival Analysis

Nicola Barbieri, Fabrizio Silvestri, Mounia Lalmas
2016 Proceedings of the 25th International Conference on World Wide Web - WWW '16  
In this paper we focus on estimating the post-click engagement on native ads by predicting the dwell time on the corresponding ad landing pages.  ...  hence leading to a better user post-click experience.  ...  ACKNOWLEDGMENTS We thank Tamar Lavee and Neetai Eshel from Yahoo Tel Aviv for the deployment of the model for the online A/B testing evaluation and for the guidance on how to analyze the data logged by  ... 
doi:10.1145/2872427.2883092 dblp:conf/www/BarbieriSL16 fatcat:yl3dhzxe6rhine4hioouttxd3i

Interoperability, XML Schema [chapter]

2017 Encyclopedia of GIS  
Network Protocols Enhancements The second class of applications for indoor location determination systems is enhancements for network protocols.  ...  A popular query, that makes use of the feature vectors, is the similarity query. For example, in image databases, the user may pose a query asking for the images most similar to a given image.  ...  For example, the shapes s in E could be restricted to 1, 2, 4, and 6.  ... 
doi:10.1007/978-3-319-17885-1_100625 fatcat:bgxdhdxa4bewzcggrogz56rdpi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
police abusiveness sentenced for violations of wiretap statute (R 20 47) P DoJ seeks wider access to computer data (R 20 55) P Risks of sharing files via Yahoo (R 20 53) Ph Risks of unexpected cell-phone  ...  problems in 2001 predicted in 1997 (S 26 4:4, R 21 37): see (R 19 49-51) .....  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
police abusiveness sentenced for violations of wiretap statute (R 20 47) P DoJ seeks wider access to computer data (R 20 55) P Risks of sharing files via Yahoo (R 20 53) Ph Risks of unexpected cell-phone  ...  problems in 2001 predicted in 1997 (S 26 4:4, R 21 37): see (R 19 49-51) .....  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
police abusiveness sentenced for violations of wiretap statute (R 20 47) P DoJ seeks wider access to computer data (R 20 55) P Risks of sharing files via Yahoo (R 20 53) Ph Risks of unexpected cell-phone  ...  problems in 2001 predicted in 1997 (S 26 4:4, R 21 37): see (R 19 49-51) .....  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Monitoring and Engineering of the Stem Cell Microenvironment: Inkjet Printing of Growth Factors onto Novel Scaffolds for Controlling Musculoskeletal Stem Cell Differentiation and Alignment

Dai Fei Elmer Ker
2018
The primary objective of this study was to develop approaches for controlling and monitoring stem cell behavior in vitro and in vivo for potential applications in regenerative medicine.  ...  To monitor stem cell behavior in vitro, a computer-vision based system was developed for realtime adaptive subculture of muscle-progenitor cells.  ...  Yin for providing helpful comments on the manuscript. Acknowledgements We would like to thank Dr. Frederick Lanni for useful discussions and assistance with DIC microscopy.  ... 
doi:10.1184/r1/6720731.v1 fatcat:zvjnyw3f2zg6jkjwkm2s2ktx4y

Illustrative Risks To The Public In The Use Of Computer Systems And Related Technology

P.G. Neumann
Symposium Record Policy Issues in Information and Communication Technologies in Medical Applications  
police abusiveness sentenced for violations of wiretap statute (R 20 47) P DoJ seeks wider access to computer data (R 20 55) P Risks of sharing files via Yahoo (R 20 53) Ph Risks of unexpected cell-phone  ...  problems in 2001 predicted in 1997 (S 26 4:4, R 21 37): see (R 19 49-51) .....  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1109/ictma.1988.669591 fatcat:wkl3mbqyjbdmfhy4wezuzx4juq