Sciweavers

531 search results - page 55 / 107
» Methods for boosting recommender systems
Sort
View
ICSE
2010
IEEE-ACM
14 years 12 days ago
StakeNet: using social networks to analyse the stakeholders of large-scale software projects
Many software projects fail because they overlook stakeholders or involve the wrong representatives of significant groups. Unfortunately, existing methods in stakeholder analysis...
Soo Ling Lim, Daniele Quercia, Anthony Finkelstein
WSDM
2012
ACM
352views Data Mining» more  WSDM 2012»
12 years 3 months ago
Multi-relational matrix factorization using bayesian personalized ranking for social network data
A key element of the social networks on the internet such as Facebook and Flickr is that they encourage users to create connections between themselves, other users and objects. On...
Artus Krohn-Grimberghe, Lucas Drumond, Christoph F...
JOT
2010
153views more  JOT 2010»
13 years 6 months ago
Identification of System Software Components Using Clustering Approach
The selection of software architecture style is an important decision of design stage, and has a significant impact on various system quality attributes. To determine software arc...
Gholamreza Shahmohammadi, Saeed Jalili, Seyed Moha...
SPIRE
2010
Springer
13 years 6 months ago
Fingerprinting Ratings for Collaborative Filtering - Theoretical and Empirical Analysis
Abstract. We consider fingerprinting methods for collaborative filtering (CF) systems. In general, CF systems show their real strength when supplied with enormous data sets. Earl...
Yoram Bachrach, Ralf Herbrich
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 8 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof