Sciweavers

SIGIR
2011
ACM
13 years 2 months ago
Collective topic modeling for heterogeneous networks
In this paper, we propose a joint probabilistic topic model for simultaneously modeling the contents of multi-typed objects of a heterogeneous information network. The intuition b...
Hongbo Deng, Bo Zhao, Jiawei Han
SIGIR
2011
ACM
13 years 2 months ago
Parallel learning to rank for information retrieval
Learning to rank represents a category of effective ranking methods for information retrieval. While the primary concern of existing research has been accuracy, learning efficien...
Shuaiqiang Wang, Byron J. Gao, Ke Wang, Hady Wiraw...
SIGIR
2011
ACM
13 years 2 months ago
Decayed DivRank: capturing relevance, diversity and prestige in information networks
Many network-based ranking approaches have been proposed to rank objects according to different criteria, including relevance, prestige and diversity. However, existing approache...
Pan Du, Jiafeng Guo, Xueqi Cheng
SIGIR
2011
ACM
13 years 2 months ago
When documents are very long, BM25 fails!
We reveal that the Okapi BM25 retrieval function tends to overly penalize very long documents. To address this problem, we present a simple yet effective extension of BM25, namel...
Yuanhua Lv, ChengXiang Zhai
SAC
2011
ACM
13 years 2 months ago
RuleGrowth: mining sequential rules common to several sequences by pattern-growth
Mining sequential rules from large databases is an important topic in data mining fields with wide applications. Most of the relevant studies focused on finding sequential rules a...
Philippe Fournier-Viger, Roger Nkambou, Vincent Sh...
PODC
2011
ACM
13 years 2 months ago
Sustaining collaboration in multicast despite rational collusion
This paper focuses on designing incentive mechanisms for overlay multicast systems. Existing proposals on the problem are no longer able to provide proper incentives when rational...
Haifeng Yu, Phillip B. Gibbons, Chenwei Shi
PLDI
2011
ACM
13 years 2 months ago
Precise and compact modular procedure summaries for heap manipulating programs
We present a strictly bottom-up, summary-based, and precise heap analysis targeted for program verification that performs strong updates to heap locations at call sites. We firs...
Isil Dillig, Thomas Dillig, Alex Aiken, Mooly Sagi...
ICSE
2011
IEEE-ACM
13 years 2 months ago
Pragmatic reuse in web application development
Highly interactive web applications that offer user experience and responsiveness of desktop applications are becoming increasingly popular. They are often composed out of visual...
Josip Maras
ICSE
2011
IEEE-ACM
13 years 2 months ago
StakeSource2.0: using social networks of stakeholders to identify and prioritise requirements
Software projects typically rely on system analysts to conduct requirements elicitation, an approach potentially costly for large projects with many stakeholders and requirements....
Soo Ling Lim, Daniela Damian, Anthony Finkelstein
ICSE
2011
IEEE-ACM
13 years 2 months ago
Miler: a toolset for exploring email data
Source code is the target and final outcome of software development. By focusing our research and analysis on source code only, we risk forgetting that software is the product of...
Alberto Bacchelli, Michele Lanza, Marco D'Ambros