Sciweavers

7168 search results - page 123 / 1434
» A Factorization Approach to Grouping
Sort
View
124
Voted
TKDD
2010
121views more  TKDD 2010»
15 years 2 months ago
Factor in the neighbors: Scalable and accurate collaborative filtering
Recommender systems provide users with personalized suggestions for products or services. These systems often rely on Collaborating Filtering (CF), where past transactions are ana...
Yehuda Koren
126
Voted
ASAP
2003
IEEE
99views Hardware» more  ASAP 2003»
15 years 7 months ago
Using Group Theory to Specify Application Specific Interconnection Networks for SIMD DSPs
We introduce another view of group theory in the field of interconnection networks. With this approach it is possible to specify application specific network topologies for permut...
Thorsten Dräger, Gerhard Fettweis
GROUP
2003
ACM
15 years 9 months ago
Increasing workplace independence for people with cognitive disabilities by leveraging distributed cognition among caregivers an
In this paper we describe a current group configuration that is used to support people with cognitive disabilities (hereinafter referred to as “clients”) in the workplace. A c...
Stefan Carmien, Rogerio DePaula, Andrew Gorman, An...
134
Voted
CSREASAM
2006
15 years 5 months ago
A New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key...
Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong
140
Voted
ADHOC
2008
146views more  ADHOC 2008»
15 years 4 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi