Sciweavers

304 search results - page 40 / 61
» Using Recommendation to Improve Negotiations in Agent-Based ...
Sort
View
SRDS
2010
IEEE
13 years 5 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
CLEF
2008
Springer
13 years 9 months ago
On the Evaluation of Snippet Selection for WebCLEF
WebCLEF is about supporting a user who is an expert in writing a survey article on a specific topic with a clear goal and audience by generating a ranked list with relevant snippet...
Arnold Overwijk, Dong Nguyen, Claudia Hauff, Dolf ...
CSCW
2012
ACM
12 years 3 months ago
Friends, romans, countrymen: lend me your URLs. using social chatter to personalize web search
People often find useful content on the web via social media. However, it is difficult to manually aggregate the information and recommendations embedded in a torrent of social ...
Abhinay Nagpal, Sudheendra Hangal, Rifat Reza Joye...
ACML
2009
Springer
14 years 2 months ago
Estimating Likelihoods for Topic Models
Abstract. Topic models are a discrete analogue to principle component analysis and independent component analysis that model topic at the word level within a document. They have ma...
Wray L. Buntine
TLT
2008
93views more  TLT 2008»
13 years 7 months ago
What Do You Prefer? Using Preferences to Enhance Learning Technology
While the growing number of learning resources increases the choice for learners on how, what and when to learn, it also makes it more and more difficult to find the learning resou...
Philipp Kärger, Daniel Olmedilla, Fabian Abel...