Sciweavers

511 search results - page 74 / 103
» Practical Differential Profiling
Sort
View
124
Voted
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
16 years 2 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
194
Voted
POPL
2002
ACM
16 years 2 months ago
An efficient profile-analysis framework for data-layout optimizations
Data-layout optimizations rearrange fields within objects, objects within objects, and objects within the heap, with the goal of increasing spatial locality. While the importance ...
Rastislav Bodík, Shai Rubin, Trishul M. Chi...
SIGMOD
2007
ACM
123views Database» more  SIGMOD 2007»
16 years 2 months ago
Schema advisor for hybrid relational-XML DBMS
In response to the widespread use of the XML format for document representation and message exchange, major database vendors support XML in terms of persistence, querying and inde...
Mirella Moura Moro, Lipyeow Lim, Yuan-Chi Chang
110
Voted
ICSE
2004
IEEE-ACM
16 years 2 months ago
An Empirical Comparison of Dynamic Impact Analysis Algorithms
Impact analysis -- determining the potential effects of changes on a software system -- plays an important role in software engineering tasks such as maintenance, regression testi...
Alessandro Orso, Taweesup Apiwattanapong, James La...
118
Voted
CSCW
2010
ACM
15 years 11 months ago
Perceptions of trustworthiness online: the role of visual and textual information
People increasingly rely on social networking websites to initiate personal and professional relationships. This requires that a considerable amount of trust be placed in stranger...
Catalina L. Toma