Sciweavers

511 search results - page 74 / 103
» Practical Differential Profiling
Sort
View
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
16 years 6 days ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
POPL
2002
ACM
16 years 4 days ago
An efficient profile-analysis framework for data-layout optimizations
Data-layout optimizations rearrange fields within objects, objects within objects, and objects within the heap, with the goal of increasing spatial locality. While the importance ...
Rastislav Bodík, Shai Rubin, Trishul M. Chi...
SIGMOD
2007
ACM
123views Database» more  SIGMOD 2007»
15 years 12 months ago
Schema advisor for hybrid relational-XML DBMS
In response to the widespread use of the XML format for document representation and message exchange, major database vendors support XML in terms of persistence, querying and inde...
Mirella Moura Moro, Lipyeow Lim, Yuan-Chi Chang
ICSE
2004
IEEE-ACM
15 years 12 months ago
An Empirical Comparison of Dynamic Impact Analysis Algorithms
Impact analysis -- determining the potential effects of changes on a software system -- plays an important role in software engineering tasks such as maintenance, regression testi...
Alessandro Orso, Taweesup Apiwattanapong, James La...
CSCW
2010
ACM
15 years 8 months ago
Perceptions of trustworthiness online: the role of visual and textual information
People increasingly rely on social networking websites to initiate personal and professional relationships. This requires that a considerable amount of trust be placed in stranger...
Catalina L. Toma