Sciweavers

8468 search results - page 1356 / 1694
» The Technology of Data Stashing
Sort
View
CHIMIT
2009
ACM
15 years 5 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
DIM
2009
ACM
15 years 5 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
ICEGOV
2009
ACM
15 years 5 months ago
Framework of e-governance at the local government level
With presumptions that e-government theories prevail in various formats and concepts around the globe, nations and institutions, not many examples are there to emulate in terms of...
Hakikur Rahman
KCAP
2009
ACM
15 years 5 months ago
Large-scale extraction and use of knowledge from text
A large amount of empirically derived world knowledge is essential for many languageprocessing tasks, to create expectations that can help assess plausibility and guide disambigua...
Peter Clark, Philip Harrison
RECSYS
2009
ACM
15 years 5 months ago
Using a trust network to improve top-N recommendation
Top-N item recommendation is one of the important tasks of recommenders. Collaborative filtering is the most popular approach to building recommender systems which can predict ra...
Mohsen Jamali, Martin Ester
« Prev « First page 1356 / 1694 Last » Next »