Sciweavers

935 search results - page 131 / 187
» A Framework for Obfuscated Interpretation
Sort
View
HICSS
2005
IEEE
131views Biometrics» more  HICSS 2005»
15 years 10 months ago
It's More than Just Use: An Investigation of Telemedicine Use Quality
Many information systems (IS) studies portray use as an indicator of system success. However, “simply saying that more use will yield more benefits without considering the natur...
Cynthia LeRouge, Alan R. Hevner
IAT
2005
IEEE
15 years 10 months ago
A Flexible BDI Architecture Supporting Extensibility
The BDI agent model comprises a simple but efficient folk psychological framework of mentalistic notions usable for modeling rational agent behaviour. Nevertheless, despite its u...
Alexander Pokahr, Lars Braubach, Winfried Lamersdo...
ITCC
2005
IEEE
15 years 10 months ago
A Web Recommendation System Based on Maximum Entropy
We propose a Web recommendation system based on a maximum entropy model. Under the maximum entropy principle, we can combine multiple levels of knowledge about users’ navigation...
Xin Jin, Bamshad Mobasher, Yanzan Zhou
ATAL
2005
Springer
15 years 10 months ago
T-Man: Gossip-Based Overlay Topology Management
Overlay topology plays an important role in P2P systems. Topology serves as a basis for achieving functions such as routing, searching and information dissemination, and it has a m...
Márk Jelasity, Özalp Babaoglu
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song