Sciweavers

347 search results - page 38 / 70
» Performance evaluation of rating aggregation algorithms in r...
Sort
View
RECSYS
2009
ACM
14 years 3 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...
SIGMOD
2010
ACM
189views Database» more  SIGMOD 2010»
14 years 1 months ago
Recsplorer: recommendation algorithms based on precedence mining
We study recommendations in applications where there are temporal patterns in the way items are consumed or watched. For example, a student who has taken the Advanced Algorithms c...
Aditya G. Parameswaran, Georgia Koutrika, Benjamin...
SENSYS
2003
ACM
14 years 1 months ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin
ISCA
2007
IEEE
171views Hardware» more  ISCA 2007»
14 years 2 months ago
Power provisioning for a warehouse-sized computer
Large-scale Internet services require a computing infrastructure that can be appropriately described as a warehouse-sized computing system. The cost of building datacenter facilit...
Xiaobo Fan, Wolf-Dietrich Weber, Luiz André...
SEMWEB
2009
Springer
14 years 3 months ago
Functions over RDF Language Elements
Spreadsheet tools are often used in business and private scenarios in order to collect and store data, and to explore and analyze these data by executing functions and aggregation...
Bernhard Schandl