Sciweavers

3451 search results - page 82 / 691
» Collaborative attack modeling
Sort
View
ESANN
2007
13 years 10 months ago
Collaborative Filtering with interlaced Generalized Linear Models
Collaborative Filtering (CF) aims at finding patterns in a sparse matrix of contingency. It can be used for example to mine the ratings given by users on a set of items. In this p...
Nicolas Delannay, Michel Verleysen
ECIR
2006
Springer
13 years 10 months ago
A User-Item Relevance Model for Log-Based Collaborative Filtering
Abstract. Implicit acquisition of user preferences makes log-based collaborative filtering favorable in practice to accomplish recommendations. In this paper, we follow a formal ap...
Jun Wang, Arjen P. de Vries, Marcel J. T. Reinders
EDCC
2008
Springer
13 years 10 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
CN
2007
80views more  CN 2007»
13 years 9 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
CSCL
2006
109views more  CSCL 2006»
13 years 9 months ago
Supporting synchronous collaborative learning: A generic, multi-dimensional model
Future CSCL technologies are described by the community as flexible, tailorable, negotiable, and appropriate for various collaborative settings, conditions and contexts. This paper...
Jacques Lonchamp