Sciweavers

1436 search results - page 105 / 288
» Experiences with the use of MERODE in the development of a W...
Sort
View
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
14 years 8 months ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
UIST
1996
ACM
13 years 12 months ago
Using the Multi-Layer Model for Building Interactive Graphical Applications
Most interactive graphical applications that use direct manipulation are built with low-level libraries such as Xlib because the graphic and interaction models of higher-level too...
Jean-Daniel Fekete, Michel Beaudouin-Lafon
WWW
2010
ACM
14 years 2 months ago
Equip tourists with knowledge mined from travelogues
With the prosperity of tourism and Web 2.0 technologies, more and more people have willingness to share their travel experiences on the Web (e.g., weblogs, forums, or Web 2.0 comm...
Qiang Hao, Rui Cai, Changhu Wang, Rong Xiao, Jiang...
DATE
2002
IEEE
137views Hardware» more  DATE 2002»
14 years 24 days ago
The Modelling of Embedded Systems Using HASoC
We present a design method (HASoC) for the lifecycle modelling of embedded systems that are targeted primarily, but not necessarily, at SoC implementations. The object-oriented de...
M. D. Edwards, P. N. Green
CIDM
2007
IEEE
13 years 8 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...