Sciweavers

1799 search results - page 264 / 360
» On bootstrapping recommender systems
Sort
View
FI
2011
96views more  FI 2011»
14 years 6 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
IJBIDM
2011
127views more  IJBIDM 2011»
14 years 6 months ago
WebUser: mining unexpected web usage
: Web usage mining has been much concentrated on the discovery of relevant user behaviours from Web access record data. In this paper, we present WebUser, an approach to discover u...
Dong (Haoyuan) Li, Anne Laurent, Pascal Poncelet
UM
2009
Springer
15 years 6 months ago
PerspectiveSpace: Opinion Modeling with Dimensionality Reduction
Abstract. Words mean different things to different people, and capturing these differences is often a subtle art. These differences are often “a matter of perspective,” and...
Jason B. Alonso, Catherine Havasi, Henry Lieberman
FAST
2010
15 years 2 months ago
BASIL: Automated IO Load Balancing Across Storage Devices
Live migration of virtual hard disks between storage arrays has long been possible. However, there is a dearth of online tools to perform automated virtual disk placement and IO l...
Ajay Gulati, Chethan Kumar, Irfan Ahmad, Karan Kum...
ECBS
2006
IEEE
112views Hardware» more  ECBS 2006»
15 years 6 months ago
A Goal-Oriented Approach for Safety Requirements Specification
Robotic systems are developed to execute tasks with several types of risks associated. The possible damages that can affect both the working environment and the self-system lead u...
Elena Navarro, Pedro Sánchez, Patricio Lete...