Sciweavers

3570 search results - page 611 / 714
» A User Model for Information Erasure
Sort
View
PAKDD
2009
ACM
135views Data Mining» more  PAKDD 2009»
15 years 6 months ago
On Mining Rating Dependencies in Online Collaborative Rating Networks
The trend of social information processing sees e-commerce and social web applications increasingly relying on user-generated content, such as rating, to determine the quality of o...
Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang
CPAIOR
2009
Springer
15 years 6 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou
ECMDAFA
2009
Springer
98views Hardware» more  ECMDAFA 2009»
15 years 6 months ago
A Language-Theoretic View on Guidelines and Consistency Rules of UML
Abstract. Guidelines and consistency rules of UML are used to control the degrees of freedom provided by the language to prevent faults. Guidelines are used in specific domains (e...
Zhe Chen, Gilles Motet
MM
2009
ACM
155views Multimedia» more  MM 2009»
15 years 6 months ago
Quality of experience in distributed interactive multimedia environments: toward a theoretical framework
The past decades have witnessed a rapid growth of Distributed Interactive Multimedia Environments (DIMEs). Despite their intensity of user-involved interaction, the existing evalu...
Wanmin Wu, Md. Ahsan Arefin, Raoul Rivas, Klara Na...
CCS
2010
ACM
15 years 6 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...