Sciweavers

924 search results - page 177 / 185
» Active Mining of Data Streams
Sort
View
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 4 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
VW
2009
Springer
153views Virtual Reality» more  VW 2009»
14 years 2 months ago
A Content Management System for User-Driven Museums in Second life
—Over two decades, a great expectation on digital museums has been addressed but most of them have been implemented based on web technologies. Emerging Second Life, which support...
Kingkarn Sookhanaphibarn, Ruck Thawonmas
ICSM
2008
IEEE
14 years 2 months ago
Automated severity assessment of software defect reports
In mission critical systems, such as those developed by NASA, it is very important that the test engineers properly recognize the severity of each issue they identify during testi...
Tim Menzies, Andrian Marcus
SAC
2006
ACM
14 years 1 months ago
A privacy preserving web recommender system
In this paper we propose a recommender system that helps users to navigate though the Web by providing dynamically generated links to pages that have not yet been visited and are ...
Ranieri Baraglia, Claudio Lucchese, Salvatore Orla...
GROUP
2005
ACM
14 years 1 months ago
Seeking the source: software source code as a social and technical artifact
In distributed software development, two sorts of dependencies can arise. The structure of the software system itself can create dependencies between software elements, while the ...
Cleidson R. B. de Souza, Jon Froehlich, Paul Douri...