Sciweavers

2194 search results - page 379 / 439
» Improving HLRTA*( k )
Sort
View
SAC
2005
ACM
14 years 4 months ago
SVD-based collaborative filtering with privacy
Collaborative ļ¬ltering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar usersā...
Huseyin Polat, Wenliang Du
SIGCSE
2005
ACM
366views Education» more  SIGCSE 2005»
14 years 4 months ago
Using asynchronous discussions to enhance student participation in CS courses
As Computer Science (CS) educators, we are involved in teaching a variety of undergraduate and graduate courses such as database management systems, networking, software developme...
Bhagyavati, Stan Kurkovsky, Christopher C. Whitehe...
SIGIR
2005
ACM
14 years 4 months ago
Do summaries help?
We describe a task-based evaluation to determine whether multi-document summaries measurably improve user performance when using online news browsing systems for directed research...
Kathleen McKeown, Rebecca J. Passonneau, David K. ...
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
14 years 4 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
ATAL
2005
Springer
14 years 4 months ago
Comprehending agent software
Software comprehension (understanding software structure and behavior) is essential for developing, maintaining, and improving software. This is particularly true of agent-based s...
Dung N. Lam, K. Suzanne Barber