Sciweavers

346 search results - page 39 / 70
» Can we trust docking results
Sort
View
DEBU
2008
165views more  DEBU 2008»
13 years 7 months ago
A Survey of Attack-Resistant Collaborative Filtering Algorithms
With the increasing popularity of recommender systems in commercial services, the quality of recommendations has increasingly become an important to study, much like the quality o...
Bhaskar Mehta, Thomas Hofmann
WEBI
2007
Springer
14 years 1 months ago
Experimental Bounds on the Usefulness of Personalized and Topic-Sensitive PageRank
PageRank is an algorithm used by several search engines to rank web documents according to their assumed relevance and popularity deduced from the Web’s link structure. PageRank...
Sinan Al-Saffar, Gregory L. Heileman
EUROSYS
2010
ACM
14 years 22 days ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 9 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
FC
2005
Springer
143views Cryptology» more  FC 2005»
14 years 1 months ago
Risk Assurance for Hedge Funds Using Zero Knowledge Proofs
Abstract. This work introduces a new tool for a fund manager to verifiably communicate portfolio risk characteristics to an investor. We address the classic dilemma: How can an in...
Michael Szydlo