Sciweavers

6514 search results - page 826 / 1303
» Low-Knowledge Algorithm Control
Sort
View
SSS
2009
Springer
123views Control Systems» more  SSS 2009»
15 years 11 months ago
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat
In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. I...
Márk Jelasity, Vilmos Bilicki
119
Voted
RECSYS
2009
ACM
15 years 11 months ago
Collaborative prediction and ranking with non-random missing data
A fundamental aspect of rating-based recommender systems is the observation process, the process by which users choose the items they rate. Nearly all research on collaborative ...
Benjamin M. Marlin, Richard S. Zemel
RECSYS
2009
ACM
15 years 11 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...
144
Voted
RECSYS
2009
ACM
15 years 11 months ago
Using a trust network to improve top-N recommendation
Top-N item recommendation is one of the important tasks of recommenders. Collaborative filtering is the most popular approach to building recommender systems which can predict ra...
Mohsen Jamali, Martin Ester
RECSYS
2009
ACM
15 years 11 months ago
Measuring predictive capability in collaborative filtering
This paper presents a new memory-based approach to Collaborative Filtering where the neighbors of the active user will be selected taking into account their predictive capability....
Luis M. de Campos, Juan M. Fernández-Luna, ...