Sciweavers

878 search results - page 130 / 176
» Factors and effects of information credibility
Sort
View
ICDM
2003
IEEE
158views Data Mining» more  ICDM 2003»
14 years 27 days ago
Combining Multiple Weak Clusterings
A data set can be clustered in many ways depending on the clustering algorithm employed, parameter settings used and other factors. Can multiple clusterings be combined so that th...
Alexander P. Topchy, Anil K. Jain, William F. Punc...
HT
2003
ACM
14 years 26 days ago
Browsing intricately interconnected paths
Graph-centric and node-centric browsing are the two commonly identified hypertext-browsing paradigms. We believe that pathcentric browsing, the browsing behavior exhibited by path...
Pratik Dave, Unmil Karadkar, Richard Furuta, Luis ...
APWEB
2003
Springer
14 years 25 days ago
An Ant Algorithm Based Dynamic Routing Strategy for Mobile Agents
Routing strategy is one of the most important aspects in a mobile agent system, which is a complex combinatorial problem. Most of current mobile agent systems adopt static routing ...
Dan Wang, Ge Yu, Mingsong Lv, Baoyan Song, Derong ...
CCGRID
2002
IEEE
14 years 17 days ago
Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella
Peer-to-peer computing and networking, an emerging model of communication and computation, has recently started to gain significant acceptance. This model not only enables client...
Evangelos P. Markatos
ICSE
2010
IEEE-ACM
14 years 12 days ago
Codebook: discovering and exploiting relationships in software repositories
Large-scale software engineering requires communication and collaboration to successfully build and ship products. We conducted a survey with Microsoft engineers on inter-team coo...
Andrew Begel, Yit Phang Khoo, Thomas Zimmermann