Sciweavers

3193 search results - page 577 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
WECWIS
2005
IEEE
137views ECommerce» more  WECWIS 2005»
14 years 2 months ago
Using Singular Value Decomposition Approximation for Collaborative Filtering
Singular Value Decomposition (SVD), together with the Expectation-Maximization (EM) procedure, can be used to find a low-dimension model that maximizes the loglikelihood of obser...
Sheng Zhang, Weihong Wang, James Ford, Fillia Make...
JAVA
2001
Springer
14 years 1 months ago
Runtime optimizations for a Java DSM implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. Jackal implements Java’s memory model and allows multithreaded Java programs...
Ronald Veldema, Rutger F. H. Hofman, Raoul Bhoedja...
CHI
1996
ACM
14 years 1 months ago
Silk from a Sow's Ear: Extracting Usable Structures from the Web
In its current implementation, the World-Wide Web lacks much of the explicit structure and strong typing found in many closed hypertext systems. While this property has directly f...
Peter Pirolli, James E. Pitkow, Ramana Rao
ROBIO
2006
IEEE
120views Robotics» more  ROBIO 2006»
14 years 3 months ago
Event Based Methodology for SuperMedia Enhanced Teleoperation
- SuperMedia provides human operators rich environmental information, thus providing telepresence and enhances efficiency of operation. However, coupling human with the remote envi...
Yang Liu, Amit Goradia, Yonghui Xue, Ning Xi
DCOSS
2006
Springer
14 years 20 days ago
Evaluating Local Contributions to Global Performance in Wireless Sensor and Actuator Networks
Wireless sensor networks are often studied with the goal of removing information from the network as efficiently as possible. However, when the application also includes an actuato...
Christopher J. Rozell, Don H. Johnson