Sciweavers

1117 search results - page 162 / 224
» A Compliance Model of Trust
Sort
View
112
Voted
JTAER
2010
147views more  JTAER 2010»
15 years 8 days ago
Privacy Issues for Online Personal Photograph Collections
Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible online digital multi-media collections. Howeve...
Sally Jo Cunningham, Masood Masoodian, Anne Adams
SDM
2010
SIAM
217views Data Mining» more  SDM 2010»
15 years 7 days ago
Collaborative Filtering: Weighted Nonnegative Matrix Factorization Incorporating User and Item Graphs
Collaborative filtering is an important topic in data mining and has been widely used in recommendation system. In this paper, we proposed a unified model for collaborative fil...
Quanquan Gu, Jie Zhou, Chris H. Q. Ding
115
Voted
CHI
2010
ACM
15 years 8 months ago
Model-driven development of advanced user interfaces
This paper reports on the 2nd Workshop on Model Driven Development of Advanced User Interfaces (MDDAUI’06) held on October 2nd, 2006 at the MoDELS’06 conference in Genova, Ital...
Jan Van den Bergh, Gerrit Meixner, Kai Breiner, An...
COMPSAC
2002
IEEE
15 years 6 months ago
Multi-Criteria Preference Analysis for Systematic Requirements Negotiation
Many software projects have failed because their requirements were poorly negotiated among stakeholders. This paper proposes a systematic model, called "MultiCriteria Prefere...
Hoh Peter In, David Olson, Tom Rodgers
AAAI
2007
15 years 4 months ago
Reasoning about Attribute Authenticity in a Web Environment
The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. How...
Thomas Wölfl