Sciweavers

4761 search results - page 734 / 953
» Generalizing Boundary Points
Sort
View
KDD
2010
ACM
327views Data Mining» more  KDD 2010»
15 years 8 months ago
Cold start link prediction
In the traditional link prediction problem, a snapshot of a social network is used as a starting point to predict, by means of graph-theoretic measures, the links that are likely ...
Vincent Leroy, Berkant Barla Cambazoglu, Francesco...
PODC
2010
ACM
15 years 8 months ago
Group mutual exclusion in O(log n) RMR
We present an algorithm to solve the GROUP MUTUAL EXCLUSION problem in the cache-coherent (CC) model. For the same problem in the distributed shared memory (DSM) model, Danek and ...
Vibhor Bhatt, Chien-Chung Huang
SIGIR
2010
ACM
15 years 8 months ago
Temporal diversity in recommender systems
Collaborative Filtering (CF) algorithms, used to build webbased recommender systems, are often evaluated in terms of how accurately they predict user ratings. However, current eva...
Neal Lathia, Stephen Hailes, Licia Capra, Xavier A...
FOAL
2007
ACM
15 years 8 months ago
On the relation of aspects and monads
The relation between aspects and monads is a recurring topic in discussions in the programming language community, although it has never been elaborated whether their resemblences...
Christian Hofer, Klaus Ostermann
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
15 years 8 months ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy