Sciweavers

33 search results - page 3 / 7
» Trying Again to Fail-First
Sort
View
CORR
2010
Springer
169views Education» more  CORR 2010»
14 years 4 months ago
Recommender Systems by means of Information Retrieval
In this paper we present a method for reformulating the Recommender Systems problem in an Information Retrieval one. In our tests we have a dataset of users who give ratings for s...
Alberto Costa, Fabio Roda
66
Voted
TCC
2010
Springer
236views Cryptology» more  TCC 2010»
15 years 6 months ago
From Passive to Covert Security at Low Cost
Aumann and Lindell defined security against covert attacks, where the adversary is malicious, but is only caught cheating with a certain probability, where the idea is that in man...
Ivan Damgård, Martin Geisler, Jesper Buus Ni...
68
Voted
MBUI
2004
112views User Interface» more  MBUI 2004»
14 years 11 months ago
Patterns, Tools and Models for Interaction Design
In recent years the re-use of already existing solutions and ideas has become more and more crucial. Re-inventing the wheel over and over again is not feasible. Especially model b...
Daniel Sinnig, Ashraf Gaffar, Ahmed Seffah, Peter ...
TREC
2004
14 years 11 months ago
HARD Track Overview in TREC 2004 - High Accuracy Retrieval from Documents
The HARD track of TREC 2004 aims to improve the accuracy of information retrieval through the use of three techniques: (1) query metadata that better describes the information nee...
James Allan
ISJGP
2007
89views more  ISJGP 2007»
14 years 9 months ago
Trends in Security Product Evaluations
Government-endorsed security evaluations, like those performed under the Common Criteria (CC), use established techniques of software quality assurance to try to evaluate product ...
Richard E. Smith