Sciweavers

1705 search results - page 170 / 341
» Introduction to recommender systems
Sort
View
SC
2005
ACM
15 years 4 months ago
Leading Computational Methods on Scalar and Vector HEC Platforms
The last decade has witnessed a rapid proliferation of superscalar cache-based microprocessors to build high-end computing (HEC) platforms, primarily because of their generality, ...
Leonid Oliker, Jonathan Carter, Michael F. Wehner,...
WETICE
2006
IEEE
15 years 5 months ago
Authorisation Using Attributes from Multiple Authorities
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals....
David W. Chadwick
CSCWD
2005
Springer
15 years 4 months ago
Supporting peer-to-peer collaboration through trust
Distributed systems generally require their component parts to interact cooperatively, in order for the system as a whole to function effectively. For any given activity, several ...
Nathan Griffiths, Shanghua Sun
CSCW
2004
ACM
15 years 4 months ago
Learning from project history: a case study for software development
The lack of lightweight communication channels and other technical and sociological difficulties make it hard for new members of a non-collocated software development team to lea...
Davor Cubranic, Gail C. Murphy, Janice Singer, Kel...
82
Voted
SIGSOFT
2009
ACM
15 years 11 months ago
Fair and balanced?: bias in bug-fix datasets
Software engineering researchers have long been interested in where and why bugs occur in code, and in predicting where they might turn up next. Historical bug-occurence data has ...
Christian Bird, Adrian Bachmann, Eirik Aune, John ...