Sciweavers

511 search results - page 48 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
107
Voted
MMSEC
2004
ACM
121views Multimedia» more  MMSEC 2004»
15 years 9 months ago
Counteracting Oracle attacks
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity verification algorithm can be modified in order to counte...
Ilaria Venturini
CODES
2005
IEEE
15 years 9 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
16 years 4 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
ECIR
2010
Springer
15 years 5 months ago
Explicit Search Result Diversification through Sub-queries
Queries submitted to a retrieval system are often ambiguous. In such a situation, a sensible strategy is to diversify the ranking of results to be retrieved, in the hope that users...
Rodrygo L. T. Santos, Jie Peng, Craig Macdonald, I...
137
Voted
WWW
2010
ACM
15 years 9 months ago
PageSense: style-wise web page advertising
This paper presents an innovative style-wise advertising platform for web page. Web page “style” mainly refers to visual effects, such as color and layout. Unlike the most po...
Lusong Li, Tao Mei, Xiang Niu, Chong-Wah Ngo