Sciweavers

511 search results - page 62 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
144
Voted
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
16 years 4 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
WWW
2009
ACM
15 years 10 months ago
Gamesense
This paper presents a novel game-like advertising system called GameSense, which is driven by the compelling contents of online images. Given a Web page which typically contains i...
Lusong Li, Tao Mei, Chris Liu, Xian-Sheng Hua
JAMIA
2010
131views more  JAMIA 2010»
14 years 10 months ago
The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data
Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information...
Christopher G. Chute, Scott A. Beck, Thomas B. Fis...
134
Voted
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 10 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
115
Voted
WWW
2006
ACM
16 years 4 months ago
Visualizing tags over time
We consider the problem of visualizing the evolution of tags within the Flickr (flickr.com) online image sharing community. Any user of the Flickr service may append a tag to any ...
Micah Dubinko, Ravi Kumar, Joseph Magnani, Jasmine...