Sciweavers

3021 search results - page 551 / 605
» Trust in recommender systems
Sort
View
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
14 years 18 days ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...
FPL
2006
Springer
140views Hardware» more  FPL 2006»
14 years 11 days ago
A Thermal Management and Profiling Method for Reconfigurable Hardware Applications
Given large circuit sizes, high clock frequencies, and possibly extreme operating environments, Field Programmable Gate Arrays (FPGAs) are capable of heating beyond their designed...
Phillip H. Jones, John W. Lockwood, Young H. Cho
WSC
1998
13 years 10 months ago
Getting Started in Simulation in Healthcare
To begin using simulation in healthcare, one must first recognize the types of problems or decisions that can best be analyzed using simulation. Once a problem has been identified...
Julie C. Lowery
BMCBI
2006
111views more  BMCBI 2006»
13 years 8 months ago
Using ESTs to improve the accuracy of de novo gene prediction
Background: ESTs are a tremendous resource for determining the exon-intron structures of genes, but even extensive EST sequencing tends to leave many exons and genes untouched. Ge...
Chaochun Wei, Michael R. Brent
POPL
2008
ACM
14 years 9 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk