Sciweavers

370 search results - page 55 / 74
» Data versioning techniques for internet transaction manageme...
Sort
View
SAC
2005
ACM
14 years 3 months ago
SVD-based collaborative filtering with privacy
Collaborative ļ¬ltering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar usersā...
Huseyin Polat, Wenliang Du
CCR
2010
179views more  CCR 2010»
13 years 10 months ago
An argument for increasing TCP's initial congestion window
TCP flows start with an initial congestion window of at most four segments or approximately 4KB of data. Because most Web transactions are short-lived, the initial congestion wind...
Nandita Dukkipati, Tiziana Refice, Yuchung Cheng, ...
INFOCOM
2010
IEEE
13 years 8 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
ā€”Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
ISW
1999
Springer
14 years 2 months ago
Region-Based Watermarking for Images
There is a spate of research activities investigating digital image watermarking schemes in an effort to control the problem of illegal proliferation of creative digital data acros...
Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogu...
VLDB
2002
ACM
137views Database» more  VLDB 2002»
13 years 10 months ago
Comparing Data Streams Using Hamming Norms (How to Zero In)
Massive data streams are now fundamental to many data processing applications. For example, Internet routers produce large scale diagnostic data streams. Such streams are rarely s...
Graham Cormode, Mayur Datar, Piotr Indyk, S. Muthu...