Sciweavers

246 search results - page 44 / 50
» Middleware support for protecting personal data from web bas...
Sort
View
KDD
2002
ACM
196views Data Mining» more  KDD 2002»
14 years 8 months ago
Comparing Two Recommender Algorithms with the Help of Recommendations by Peers
Abstract. Since more and more Web sites, especially sites of retailers, offer automatic recommendation services using Web usage mining, evaluation of recommender algorithms has bec...
Andreas Geyer-Schulz, Michael Hahsler
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 16 days ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
IMC
2003
ACM
14 years 29 days ago
Constructing internet coordinate system based on delay measurement
In this paper, we consider the problem of how to represent the locations of Internet hosts in a Cartesian coordinate system to facilitate estimate of the network distance between ...
Hyuk Lim, Jennifer C. Hou, Chong-Ho Choi
ERCIMDL
2010
Springer
135views Education» more  ERCIMDL 2010»
13 years 8 months ago
Automating Logical Preservation for Small Institutions with Hoppla
Preserving digital information over the long term becomes increasing important for large number of institutions. The required expertise and limited tool support discourage especial...
Stephan Strodl, Petar Petrov, Michael Greifeneder,...
CCS
2009
ACM
14 years 8 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin