Sciweavers

1705 search results - page 245 / 341
» Introduction to recommender systems
Sort
View
SIGKDD
2008
124views more  SIGKDD 2008»
14 years 10 months ago
WebKDD 2008: 10 years of knowledge discovery on the web post-workshop report
WebKDD was held in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2008), August 24, 2008, in Henderson/Las Vegas, Nevada...
Olfa Nasraoui, Myra Spiliopoulou, Osmar R. Zaï...
INFORMATICALT
2007
101views more  INFORMATICALT 2007»
14 years 10 months ago
Internationalization of Compilers
Internationalization of compilers and localization of programming languages is not a usual phenomenon yet; however, due to a rapid progress of software and programming technologies...
Valentina Dagiene, Rimgaudas Laucius
COMPSEC
2004
156views more  COMPSEC 2004»
14 years 10 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
CCR
1998
75views more  CCR 1998»
14 years 10 months ago
A comparative analysis of groupware application protocols
Two of the most difficult problems faced by developers of synchronous groupware applications are the handling of multiple session connections and the maintenance of replicated dat...
Mark Pendergast
99
Voted
EGOV
2010
Springer
14 years 9 months ago
Information Strategies for Open Government: Challenges and Prospects for Deriving Public Value from Government Transparency
Information-based strategies to promote open government offer many opportunities to generate social and economic value through public use of government information. Public and poli...
Sharon S. Dawes, Natalie Helbig