Sciweavers

2492 search results - page 486 / 499
» False-Name-Proofness in Social Networks
Sort
View
AGILEDC
2009
IEEE
14 years 2 months ago
Fully Distributed Scrum: Linear Scalability of Production between San Francisco and India
—The Scrum software development framework was designed for the hyperproductive state where productivity increases by 5-10 times over waterfall teams and many colocated teams have...
Jeff Sutherland, Guido Schoonheim, N. Kumar, V. Pa...
OZCHI
2009
ACM
14 years 2 months ago
Towards an ethical interaction design: the issue of including stakeholders in law-enforcement software development
In the public sector (particularly in the UK in light of recent reforms i.e. the Local Government Act 2000, etc.) a greater degree of accountability and public involvement or inte...
Patrick G. Watson, Penny Duquenoy, Margaret Brenna...
SC
2009
ACM
14 years 2 months ago
Evaluating use of data flow systems for large graph analysis
Large graph analysis has become increasingly important and is widely used in many applications such as web mining, social network analysis, biology, and information retrieval. The...
Andy Yoo, Ian Kaplan
WSDM
2009
ACM
117views Data Mining» more  WSDM 2009»
14 years 2 months ago
Query by document
We are experiencing an unprecedented increase of content contributed by users in forums such as blogs, social networking sites and microblogging services. Such abundance of conten...
Yin Yang, Nilesh Bansal, Wisam Dakka, Panagiotis G...
ICDM
2009
IEEE
126views Data Mining» more  ICDM 2009»
14 years 2 months ago
Convex Non-negative Matrix Factorization in the Wild
Abstract—Non-negative matrix factorization (NMF) has recently received a lot of attention in data mining, information retrieval, and computer vision. It factorizes a non-negative...
Christian Thurau, Kristian Kersting, Christian Bau...