Sciweavers

5984 search results - page 1119 / 1197
» The Informal Nature of Systems Engineering
Sort
View
WWW
2011
ACM
13 years 3 months ago
Evaluation of valuable user generated content on social news web sites
Social news websites have gained significant popularity over the last few years. The participants of such websites are not only allowed to share news links but also to annotate, ...
Yana Volkovich, Andreas Kaltenbrunner
KDD
2012
ACM
187views Data Mining» more  KDD 2012»
11 years 11 months ago
Online learning to diversify from implicit feedback
In order to minimize redundancy and optimize coverage of multiple user interests, search engines and recommender systems aim to diversify their set of results. To date, these dive...
Karthik Raman, Pannaga Shivaswamy, Thorsten Joachi...
ISI
2008
Springer
13 years 8 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
KDD
2006
ACM
122views Data Mining» more  KDD 2006»
14 years 9 months ago
Tensor-CUR decompositions for tensor-based data
Motivated by numerous applications in which the data may be modeled by a variable subscripted by three or more indices, we develop a tensor-based extension of the matrix CUR decom...
Michael W. Mahoney, Mauro Maggioni, Petros Drineas
POPL
2008
ACM
14 years 9 months ago
The design and implementation of typed scheme
When scripts in untyped languages grow into large programs, maintaining them becomes difficult. A lack of types in typical scripting languages means that programmers must (re)disc...
Sam Tobin-Hochstadt, Matthias Felleisen
« Prev « First page 1119 / 1197 Last » Next »