Sciweavers

177 search results - page 21 / 36
» Analysis of recommendation algorithms for e-commerce
Sort
View
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
14 years 1 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques
APSCC
2007
IEEE
13 years 9 months ago
Consumer-Friendly Shopping Assistance by Personal Behavior Log Analysis on Ubiquitous Shop Space
: This paper has proposed a shopping assistance service. We provide consumer-friendly services which based on personal behavior log data. The consumer-friendly services are informa...
Somkiat Sae-Ueng, Sineenard Pinyapong, Akihiro Ogi...
BIBE
2007
IEEE
153views Bioinformatics» more  BIBE 2007»
13 years 9 months ago
Combined expression data with missing values and gene interaction network analysis: a Markovian integrated approach
—DNA microarray technologies provide means for monitoring in the order of tens of thousands of gene expression levels quantitatively and simultaneously. However data generated in...
Juliette Blanchet, Matthieu Vignes
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
14 years 2 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...
KDD
2006
ACM
122views Data Mining» more  KDD 2006»
14 years 8 months ago
Tensor-CUR decompositions for tensor-based data
Motivated by numerous applications in which the data may be modeled by a variable subscripted by three or more indices, we develop a tensor-based extension of the matrix CUR decom...
Michael W. Mahoney, Mauro Maggioni, Petros Drineas