Sciweavers

3021 search results - page 533 / 605
» Trust in recommender systems
Sort
View
CSWWS
2006
14 years 13 days ago
Fulfilling the Needs of a Metadata Creator and Analyst- An Investigation of RDF Browsing and Visualization Tools
The realization of Semantic Web vision is based on the creation and use of semantic web content which needs software tools both for semantic web developers and end users. Over the ...
Shah Kushro, A. Min Tjoa
DSN
2006
IEEE
14 years 13 days ago
Efficient High Hamming Distance CRCs for Embedded Networks
Cyclic redundancy codes (CRCs) are widely used in network transmission and data storage applications because they provide better error detection than lighter weight checksum techn...
Justin Ray, Philip Koopman
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 12 days ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
AAAI
2008
13 years 11 months ago
Partially Synchronized DEC-MDPs in Dynamic Mechanism Design
In this paper, we combine for the first time the methods of dynamic mechanism design with techniques from decentralized decision making under uncertainty. Consider a multi-agent s...
Sven Seuken, Ruggiero Cavallo, David C. Parkes
MSR
2010
ACM
13 years 10 months ago
Replaying IDE interactions to evaluate and improve change prediction approaches
Abstract—Change prediction helps developers by recommending program entities that will have to be changed alongside the entities currently being changed. To evaluate their accura...
Romain Robbes, Damien Pollet, Michele Lanza