Sciweavers

109 search results - page 18 / 22
» A personalized framework for trust assessment
Sort
View
ICDCS
2011
IEEE
12 years 8 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
FLAIRS
2007
13 years 11 months ago
Explaining Task Processing in Cognitive Assistants that Learn
As personal assistant software matures and assumes more autonomous control of its users’ activities, it becomes more critical that this software can explain its task processing....
Deborah L. McGuinness, Alyssa Glass, Michael Wolve...
DOLAP
2010
ACM
13 years 6 months ago
Integrating OLAP and recommender systems: an evaluation perspective
The integration of OLAP with web-search technologies is a promising research topic. Recommender systems are popular web-search mechanisms, because they can address information ove...
Artus Krohn-Grimberghe, Alexandros Nanopoulos, Lar...
SAC
2011
ACM
12 years 11 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
PAMI
2006
243views more  PAMI 2006»
13 years 8 months ago
Dynamical Statistical Shape Priors for Level Set-Based Tracking
In recent years, researchers have proposed to introduce statistical shape knowledge into level set based segmentation methods in order to cope with insufficient low-level informati...
Daniel Cremers