Sciweavers

3451 search results - page 521 / 691
» Collaborative attack modeling
Sort
View
RECSYS
2009
ACM
14 years 3 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...
CIDM
2007
IEEE
14 years 3 months ago
Mining Subspace Correlations
— In recent applications of clustering such as gene expression microarray analysis, collaborative filtering, and web mining, object similarity is no longer measured by physical ...
Rave Harpaz, Robert M. Haralick
ICC
2007
IEEE
14 years 3 months ago
Adaptive Channel Reuse in Cellular Systems
Abstract— In cellular systems a large reuse distance reduces cochannel interference while a small reuse distance increases bandwidth allocated to each cell. The optimal reuse dis...
Yifan Liang, Andrea J. Goldsmith
ISVC
2007
Springer
14 years 3 months ago
A Vision-Based Architecture for Intent Recognition
Abstract. Understanding intent is an important aspect of communication among people and is an essential component of the human cognitive system. This capability is particularly rel...
Alireza Tavakkoli, Richard Kelley, Christopher Kin...
IEEESCC
2006
IEEE
14 years 3 months ago
Multiagent Policy Architecture for Virtual Business Organizations
A virtual organization (VO) is a dynamic collection of entities (individuals, enterprises, and information resources) collaborating on some computational activity. VOs are an emer...
Yathiraj B. Udupi, Munindar P. Singh