Sciweavers

551 search results - page 91 / 111
» Collaboration Analysis in Recommender Systems Using Social N...
Sort
View
78
Voted
CONEXT
2009
ACM
14 years 10 months ago
ThunderDome: discovering upload constraints using decentralized bandwidth tournaments
ThunderDome is a system for collaboratively measuring upload bandwidths in ad-hoc peer-to-peer systems. It works by scheduling bandwidth probes between pairs of hosts, wherein eac...
John R. Douceur, James W. Mickens, Thomas Moscibro...
INFSOF
2006
90views more  INFSOF 2006»
14 years 9 months ago
Identifying knowledge brokers that yield software engineering knowledge in OSS projects
Much research on open source software development concentrates on developer lists and other software repositories to investigate what motivates professional software developers to...
Sulayman K. Sowe, Ioannis Stamelos, Lefteris Angel...
CHI
2009
ACM
15 years 10 months ago
Making sense of strangers' expertise from signals in digital artifacts
Contemporary work increasingly involves interacting with strangers in technology-mediated environments. In this context, we come to rely on digital artifacts to infer characterist...
N. Sadat Shami, Kate Ehrlich, Geri Gay, Jeffrey T....
IPM
2006
94views more  IPM 2006»
14 years 9 months ago
Binary Pathfinder: An improvement to the Pathfinder algorithm
The Pathfinder algorithm is widely used to prune social networks. The pruning maintains the geodesic distances between nodes. It has shown itself to be very useful in the analysis...
Vicente P. Guerrero Bote, Felipe Zapico-Alonso, Ma...
CLOUD
2010
ACM
15 years 2 months ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi