Sciweavers

3451 search results - page 85 / 691
» Collaborative attack modeling
Sort
View
ICSE
2008
IEEE-ACM
14 years 9 months ago
The economy of collective attention for situated knowledge collaboration in software development
Because the knowledge required for the construction of a complex software system is often widely distributed among its members, programmers routinely engage in collaboration with ...
Yunwen Ye, Kumiyo Nakakoji, Yasuhiro Yamamoto
AIED
2005
Springer
14 years 2 months ago
Collaboration and Cognitive Tutoring: Integration, Empirical Results, and Future Directions
In this paper, we describe progress we have made toward providing cognitive tutoring to students within a collaborative software environment. First, we have integrated a collaborat...
Andreas Harrer, Bruce M. McLaren, Erin Walker, Lar...
JUCS
2008
109views more  JUCS 2008»
13 years 9 months ago
Seamless Transition between Connected and Disconnected Collaborative Interaction
Abstract: Nowadays, more and more users make use of web-based collaborative systems. Users participate in communities or search for and provide information in webbased systems. The...
Stephan Lukosch
SIGIR
2008
ACM
13 years 9 months ago
EigenRank: a ranking-oriented approach to collaborative filtering
A recommender system must be able to suggest items that are likely to be preferred by the user. In most systems, the degree of preference is represented by a rating score. Given a...
Nathan Nan Liu, Qiang Yang
CNSM
2010
13 years 7 months ago
Effective acquaintance management for Collaborative Intrusion Detection Networks
Abstract--An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions...
Carol J. Fung, Jie Zhang, Raouf Boutaba