Sciweavers

1445 search results - page 208 / 289
» Distributed Computing Technologies and Their Application to ...
Sort
View
ITRUST
2004
Springer
15 years 6 months ago
Analyzing Correlation between Trust and User Similarity in Online Communities
Abstract. Past evidence has shown that generic approaches to recommender systems based upon collaborative filtering tend to poorly scale. Moreover, their fitness for scenarios su...
Cai-Nicolas Ziegler, Georg Lausen
EUC
2006
Springer
15 years 4 months ago
Prediction Efficiency in Predictive p-CSMA/CD
Predictive p-persistent CSMA protocol is an important MAC solution developed for networked sensor/control applications and used in Local Operating Networks (LonWorks) technology. T...
Marek Miskowicz
94
Voted
DAC
2010
ACM
15 years 2 months ago
Network on chip design and optimization using specialized influence models
In this study, we propose the use of specialized influence models to capture the dynamic behavior of a Network-onChip (NoC). Our goal is to construct a versatile modeling framewor...
Cristinel Ababei
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
16 years 1 months ago
Tell me something I don't know: randomization strategies for iterative data mining
There is a wide variety of data mining methods available, and it is generally useful in exploratory data analysis to use many different methods for the same dataset. This, however...
Heikki Mannila, Kai Puolamäki, Markus Ojala, ...
MOBILITY
2009
ACM
15 years 7 months ago
A membership management protocol for mobile P2P networks
MANETs are self-organizing networks composed of mobile wireless nodes with often scarce resources. Distributed applications based on the P2P paradigm are by nature good candidates...
Mohamed Karim Sbai, Emna Salhi, Chadi Barakat