Sciweavers

567 search results - page 51 / 114
» Collaborative recommender systems: Combining effectiveness a...
Sort
View
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
14 years 3 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
TEC
2002
81views more  TEC 2002»
14 years 11 months ago
Genetic object recognition using combinations of views
We investigate the application of genetic algorithms (GAs) for recognizing real two-dimensional (2-D) or three-dimensional (3-D) objects from 2-D intensity images, assuming that th...
George Bebis, Evangelos A. Yfantis, Sushil J. Loui...
WWW
2008
ACM
14 years 11 months ago
Flexible Semantic-Based Service Matchmaking and Discovery
Automated techniques and tools are required to effectively locate services that fulfill a given user request in a mobility context. To this purpose, the use of semantic description...
Devis Bianchini, Valeria De Antonellis, Michele Me...
NIPS
2008
15 years 1 months ago
One sketch for all: Theory and Application of Conditional Random Sampling
Conditional Random Sampling (CRS) was originally proposed for efficiently computing pairwise (l2, l1) distances, in static, large-scale, and sparse data. This study modifies the o...
Ping Li, Kenneth Ward Church, Trevor Hastie
OAS
2003
15 years 1 months ago
Collaborative Understanding of Distributed Ontologies in a Multiagent Framework: Design and Experiments
In this paper, we describe our work-in-progress with collaborative understanding of distributed ontologies in a multiagent framework. As reported earlier, the objective of this fr...
Leen-Kiat Soh