Sciweavers

33 search results - page 3 / 7
» Trying Again to Fail-First
Sort
View
CORR
2010
Springer
169views Education» more  CORR 2010»
14 years 6 months ago
Recommender Systems by means of Information Retrieval
In this paper we present a method for reformulating the Recommender Systems problem in an Information Retrieval one. In our tests we have a dataset of users who give ratings for s...
Alberto Costa, Fabio Roda
TCC
2010
Springer
236views Cryptology» more  TCC 2010»
15 years 8 months ago
From Passive to Covert Security at Low Cost
Aumann and Lindell defined security against covert attacks, where the adversary is malicious, but is only caught cheating with a certain probability, where the idea is that in man...
Ivan Damgård, Martin Geisler, Jesper Buus Ni...
MBUI
2004
112views User Interface» more  MBUI 2004»
15 years 1 months ago
Patterns, Tools and Models for Interaction Design
In recent years the re-use of already existing solutions and ideas has become more and more crucial. Re-inventing the wheel over and over again is not feasible. Especially model b...
Daniel Sinnig, Ashraf Gaffar, Ahmed Seffah, Peter ...
TREC
2004
15 years 1 months ago
HARD Track Overview in TREC 2004 - High Accuracy Retrieval from Documents
The HARD track of TREC 2004 aims to improve the accuracy of information retrieval through the use of three techniques: (1) query metadata that better describes the information nee...
James Allan
ISJGP
2007
89views more  ISJGP 2007»
14 years 11 months ago
Trends in Security Product Evaluations
Government-endorsed security evaluations, like those performed under the Common Criteria (CC), use established techniques of software quality assurance to try to evaluate product ...
Richard E. Smith