Sciweavers

GROUP
2010
ACM
13 years 6 months ago
Everyday favors: a case study of a local online gift exchange system
This paper focuses on online gift exchange in a setting where online and offline interactions are tightly intertwined and most of the exchanges require face-to-face interaction to...
Emmi Suhonen, Airi Lampinen, Coye Cheshire, Judd A...
GROUP
2010
ACM
13 years 6 months ago
Towards a group recommender process model for ad-hoc groups and on-demand recommendations
Movie recommender systems simplify the movie selection by providing movie suggestions based on the respective user's personal taste. Most of the current systems address indiv...
Christoph Beckmann, Tom Gross
GROUP
2010
ACM
13 years 6 months ago
Enhancing group recommendation by incorporating social relationship interactions
Group recommendation, which makes recommendations to a group of users instead of individuals, has become increasingly important in both the workspace and people's social acti...
Mike Gartrell, Xinyu Xing, Qin Lv, Aaron Beach, Ri...
GROUP
2010
ACM
13 years 6 months ago
Collaborative poetry on the facebook social network
Previous research has identified many characteristics of social networks that can support creative collaboration. To examine the possibilities and issues involved, we created a co...
Foad Hamidi, Melanie Baljko
GRC
2010
IEEE
13 years 6 months ago
Genetic-Fuzzy Data Mining Techniques
This paper surveys some genetic-fuzzy data mining techniques for mining both membership functions and fuzzy association rules. The motivation from crisp mining to fuzzy mining wil...
Tzung-Pei Hong, Chun-Hao Chen, Vincent S. Tseng
GRC
2010
IEEE
13 years 6 months ago
A Comparative Study of Threshold-Based Feature Selection Techniques
Given high-dimensional software measurement data, researchers and practitioners often use feature (metric) selection techniques to improve the performance of software quality clas...
Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hu...
CSC
2010
13 years 6 months ago
Efficiency in Computing Correlation Matrix of Wavelet Coefficients by Exploiting Index Structure
Correlation matrices are ubiquitous throughout signal processing, networking and in many areas of science. However, our study of the literature found that there is limited research...
Claude Turner
CSC
2010
13 years 6 months ago
Accuracy of the Immersed Boundary Method in Fixed-Point Arithmetic
Abstract-- The immersed boundary (IB) method is an algorithm for simulating elastic structures immersed in a fluid. The IB method can be used, for example, to simulate blood flow i...
Gabor Ferencz, Eric Peskin, Charles Peskin
CSC
2010
13 years 6 months ago
An Evaluation of Parallel Knapsack Algorithms on Multicore Architectures
Emergence of chip multiprocessor systems has dramatically increased the performance potential of computer systems. Since the amount of exploited parallelism is directly influenced ...
Hammad Rashid, Clara Novoa, Apan Qasem
CF
2010
ACM
13 years 6 months ago
Supporting lock-free composition of concurrent data objects
Lock-free data objects offer several advantages over their blocking counterparts, such as being immune to deadlocks and convoying and, more importantly, being highly concurrent. H...
Daniel Cederman, Philippas Tsigas