Sciweavers

3021 search results - page 492 / 605
» Trust in recommender systems
Sort
View
FLAIRS
2011
13 years 1 months ago
Intentional Analysis of Medical Conversations for Community Engagement
With an explosion in the proliferation of user-generated content in communities, information overload is increasing and quality of readily available online content is deterioratin...
Saurav Sahay
CORR
2012
Springer
272views Education» more  CORR 2012»
12 years 5 months ago
Fast and Exact Top-k Search for Random Walk with Restart
Graphs are fundamental data structures and have been employed for centuries to model real-world systems and phenomena. Random walk with restart (RWR) provides a good proximity sco...
Yasuhiro Fujiwara, Makoto Nakatsuji, Makoto Onizuk...
ACL
2012
12 years 13 days ago
Applications of GPC Rules and Character Structures in Games for Learning Chinese Characters
We demonstrate applications of psycholinguistic and sublexical information for learning Chinese characters. The knowledge about the grapheme-phoneme conversion (GPC) rules of lang...
Wei-Jie Huang, Chia-Ru Chou, Yu-Lin Tzeng, Chia-Yi...
COOPIS
2002
IEEE
14 years 3 months ago
Empirical Differences between COTS Middleware Scheduling Strategies
The proportion of complex distributed real-time embedded (DRE) systems made up of commercial-off-the-shelf (COTS) hardware and software is increasing significantly in response to...
Christopher D. Gill, Fred Kuhns, Douglas C. Schmid...
SOSP
2003
ACM
14 years 7 months ago
Samsara: honor among thieves in peer-to-peer storage
Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement m...
Landon P. Cox, Brian D. Noble