Sciweavers

11428 search results - page 2238 / 2286
» Learning From Crowds
Sort
View
CIDM
2009
IEEE
15 years 8 months ago
Empirical comparison of graph classification algorithms
The graph classification problem is learning to classify separate, individual graphs in a graph database into two or more categories. A number of algorithms have been introduced fo...
Nikhil S. Ketkar, Lawrence B. Holder, Diane J. Coo...
ACMIDC
2009
15 years 8 months ago
Designing intergenerational mobile storytelling
Informal educational experiences with grandparents and other older adults can be an important component of childrens education, especially in circumstances where high quality educ...
Allison Druin, Benjamin B. Bederson, Alexander J. ...
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 8 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
15 years 8 months ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...
ER
2007
Springer
146views Database» more  ER 2007»
15 years 8 months ago
Achieving, Satisficing, and Excelling
Abstract. Definitions of the concepts derived from the goal concept (including functional and nonfunctional goal, hardgoal, and softgoal) used in requirements engineering are discu...
Ivan Jureta, Stéphane Faulkner, Pierre-Yves...
« Prev « First page 2238 / 2286 Last » Next »