Sciweavers

1295 search results - page 216 / 259
» Technology Challenges in a Data Warehouse
Sort
View
AIRS
2005
Springer
14 years 2 months ago
A Probabilistic Model for Music Recommendation Considering Audio Features
In order to make personalized recommendations, many collaborative music recommender systems (CMRS) focused on capturing precise similarities among users or items based on user hist...
Qing Li, Sung-Hyon Myaeng, Donghai Guan, Byeong Ma...
ISI
2005
Springer
14 years 2 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
SIGIR
2003
ACM
14 years 1 months ago
Beyond independent relevance: methods and evaluation metrics for subtopic retrieval
We present a non-traditional retrieval problem we call subtopic retrieval. The subtopic retrieval problem is concerned with finding documents that cover many different subtopics ...
ChengXiang Zhai, William W. Cohen, John D. Laffert...
CHIMIT
2007
ACM
14 years 20 days ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
APSEC
2004
IEEE
14 years 13 days ago
Quality Improvements by Integrating Development Processes
Software is an increasing and important part of many products and systems. Software, hardware, and system level components have been developed and produced following separate proc...
Annita Persson Dahlqvist, Ivica Crnkovic, Ulf Askl...