Sciweavers

919 search results - page 153 / 184
» Evaluation of an Approach to Expertise Finding
Sort
View
CSL
2007
Springer
15 years 1 months ago
Accessing speech data using strategic fixation
When users access information from text, they engage in strategic fixation, visually scanning the text to focus on regions of interest. However, because speech is both serial and ...
Steve Whittaker, Julia Hirschberg
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
16 years 2 months ago
TrustWalker: a random walk model for combining trust-based and item-based recommendation
Collaborative filtering is the most popular approach to build recommender systems and has been successfully employed in many applications. However, it cannot make recommendations ...
Mohsen Jamali, Martin Ester
MOBIHOC
2002
ACM
16 years 1 months ago
On using the ad-hoc network model in cellular packet data networks
While several approaches have been proposed in literature for improving the performance of wireless packet data networks, a recent class of approaches has focused on improving the...
Hung-Yun Hsieh, Raghupathy Sivakumar
CIKM
2009
Springer
15 years 8 months ago
Feature selection for ranking using boosted trees
Modern search engines have to be fast to satisfy users, so there are hard back-end latency requirements. The set of features useful for search ranking functions, though, continues...
Feng Pan, Tim Converse, David Ahn, Franco Salvetti...
CCS
2007
ACM
15 years 8 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...