Sciweavers

62 search results - page 10 / 13
» An Empirical Evaluation of Three Defect-Detection Techniques
Sort
View
SAC
2008
ACM
13 years 7 months ago
Tag-aware recommender systems by fusion of collaborative filtering algorithms
Recommender Systems (RS) aim at predicting items or ratings of items that the user are interested in. Collaborative Filtering (CF) algorithms such as user- and item-based methods ...
Karen H. L. Tso-Sutter, Leandro Balby Marinho, Lar...
EDBT
2010
ACM
185views Database» more  EDBT 2010»
13 years 9 months ago
Probabilistic threshold k nearest neighbor queries over moving objects in symbolic indoor space
The availability of indoor positioning renders it possible to deploy location-based services in indoor spaces. Many such services will benefit from the efficient support for k n...
Bin Yang 0002, Hua Lu, Christian S. Jensen
MIR
2010
ACM
207views Multimedia» more  MIR 2010»
13 years 5 months ago
Learning to rank for content-based image retrieval
In Content-based Image Retrieval (CBIR), accurately ranking the returned images is of paramount importance, since users consider mostly the topmost results. The typical ranking st...
Fabio F. Faria, Adriano Veloso, Humberto Mossri de...
ECRTS
2006
IEEE
14 years 1 months ago
Hierarchical Control of Multiple Resources in Distributed Real-time and Embedded Systems
There is an increasing demand to introduce adaptive capabilities in distributed real-time and embedded (DRE) systems that execute in open environments where system operational con...
Nishanth Shankaran, Xenofon D. Koutsoukos, Douglas...
AUIC
2005
IEEE
14 years 1 months ago
Aiding Text Entry of Foreign Alphabets with Visual Keyboard Plus
Computer keyboards are used to input hundreds of different languages using many different alphabets. Despite this diversity, the physical layout of keyboards is fairly uniform, ...
L. Rennie, Andy Cockburn