Sciweavers

3444 search results - page 597 / 689
» A Theory of Object-Oriented Design
Sort
View
KDD
2007
ACM
244views Data Mining» more  KDD 2007»
14 years 9 months ago
A Recommender System Based on Local Random Walks and Spectral Methods
In this paper, we design recommender systems for weblogs based on the link structure among them. We propose algorithms based on refined random walks and spectral methods. First, w...
Zeinab Abbassi, Vahab S. Mirrokni
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 9 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
CHI
2007
ACM
14 years 9 months ago
What happened to remote usability testing?: an empirical study of three methods
The idea of conducting usability tests remotely emerged ten years ago. Since then, it has been studied empirically, and some software organizations employ remote methods. Yet ther...
Henrik Villemann Nielsen, Jan Stage, Morten Sieker...
CHI
2004
ACM
14 years 9 months ago
Effects of instant messaging on the management of multiple project trajectories
We present a study of the effects of instant messaging (IM) on individuals' management of work across multiple collaborative projects. Groups of four participants completed f...
Susan R. Fussell, Sara B. Kiesler, Leslie D. Setlo...
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
14 years 9 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith