Sciweavers

438 search results - page 32 / 88
» date 2009
Sort
View
66
Voted
EDM
2009
114views Data Mining» more  EDM 2009»
14 years 8 months ago
Edu-mining for Book Recommendation for Pupils
This paper proposes a novel method for recommending books to pupils based on a framework called Edu-mining. One of the properties of the proposed method is that it uses only loan h...
Ryo Nagata, Keigo Takeda, Koji Suda, Jun'ichi Kake...
88
Voted
ACSC
2009
IEEE
15 years 5 months ago
Using Chronological Splitting to Compare Cross- and Single-company Effort Models: Further Investigation
Numerous studies have used historical datasets to build and validate models for estimating software development effort. Very few used a chronological split (where projects’ end ...
Chris Lokan, Emilia Mendes
67
Voted
DOCENG
2008
ACM
14 years 12 months ago
Automated repurposing of implicitly structured documents
: From the least to most prominent elements, documents are arranged in a tacit visual hierarchy. This is essential for document scanning and comprehension. This conceptual structur...
Helen Balinsky, Anthony Wiley, Michael Rhodes, Alf...
SODA
2010
ACM
164views Algorithms» more  SODA 2010»
14 years 8 months ago
Hardness Results for Homology Localization
: © Hardness Results for Homology Localization Chao Chen, Daniel Freedman HP Laboratories HPL-2009-374 algebraic topology, homology, localization We address the problem of localiz...
Chao Chen, Daniel Freedman
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
15 years 5 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...