Sciweavers

11182 search results - page 1971 / 2237
» Shape Analysis of Sets
Sort
View
129
Voted
CISS
2008
IEEE
15 years 11 months ago
A lower-bound on the number of rankings required in recommender systems using collaborativ filtering
— We consider the situation where users rank items from a given set, and each user ranks only a (small) subset of all items. We assume that users can be classified into C classe...
Peter Marbach
197
Voted
CLADE
2008
IEEE
15 years 11 months ago
SWARM: a scientific workflow for supporting bayesian approaches to improve metabolic models
With the exponential growth of complete genome sequences, the analysis of these sequences is becoming a powerful approach to build genome-scale metabolic models. These models can ...
Xinghua Shi, Rick Stevens
ICST
2008
IEEE
15 years 11 months ago
Pre-testing Flash Device Driver through Model Checking Techniques
Flash memory has become virtually indispensable in most mobile devices, such as mobile phones, digital cameras, mp3 players, etc. In order for mobile devices to successfully provi...
Moonzoo Kim, Yunja Choi, Yunho Kim, Hotae Kim
NDSS
2008
IEEE
15 years 11 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
149
Voted
KBSE
2007
IEEE
15 years 10 months ago
Modeling bug report quality
Software developers spend a significant portion of their resources handling user-submitted bug reports. For software that is widely deployed, the number of bug reports typically ...
Pieter Hooimeijer, Westley Weimer
« Prev « First page 1971 / 2237 Last » Next »