Sciweavers

5254 search results - page 897 / 1051
» The Evaluation of Courses in Information Systems
Sort
View
SIGSOFT
2007
ACM
16 years 2 months ago
Recommending random walks
We improve on previous recommender systems by taking advantage of the layered structure of software. We use a random-walk approach, mimicking the more focused behavior of a develo...
Zachary M. Saul, Vladimir Filkov, Premkumar T. Dev...
WWW
2009
ACM
16 years 2 months ago
Detecting the origin of text segments efficiently
In the origin detection problem an algorithm is given a set S of documents, ordered by creation time, and a query document D. It needs to output for every consecutive sequence of ...
Ossama Abdel Hamid, Behshad Behzadi, Stefan Christ...
WWW
2009
ACM
16 years 2 months ago
The slashdot zoo: mining a social network with negative edges
We analyse the corpus of user relationships of the Slashdot technology news site. The data was collected from the Slashdot Zoo feature where users of the website can tag other use...
Andreas Lommatzsch, Christian Bauckhage, Jé...
WWW
2008
ACM
16 years 2 months ago
User behavior oriented web spam detection
Combating Web spam has become one of the top challenges for Web search engines. State-of-the-art spam detection techniques are usually designed for specific known types of Web spa...
Yiqun Liu, Min Zhang, Shaoping Ma, Liyun Ru
WWW
2008
ACM
16 years 2 months ago
Which "Apple" are you talking about ?
In a higher level task such as clustering of web results or word sense disambiguation, knowledge of all possible distinct concepts in which an ambiguous word can be expressed woul...
Mandar Rahurkar, Dan Roth, Thomas S. Huang