Sciweavers

365 search results - page 71 / 73
» Determining Internet Users' Values for Private Information
Sort
View
ACSAC
1999
IEEE
14 years 2 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
DKE
2007
130views more  DKE 2007»
13 years 9 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
WISE
2009
Springer
14 years 6 months ago
Start Trusting Strangers? Bootstrapping and Prediction of Trust
Web-based environments typically span interactions between humans and software services. The management and automatic calculation of trust are among the key challenges of the futur...
Florian Skopik, Daniel Schall, Schahram Dustdar
CIKM
2009
Springer
14 years 4 months ago
Semi-nonnegative matrix factorization with global statistical consistency for collaborative filtering
Collaborative Filtering, considered by many researchers as the most important technique for information filtering, has been extensively studied by both academic and industrial co...
Hao Ma, Haixuan Yang, Irwin King, Michael R. Lyu
CORR
2007
Springer
63views Education» more  CORR 2007»
13 years 9 months ago
Optimizing the SINR operating point of spatial networks
— This paper addresses the following question, which is of interest in the design and deployment of a multiuser decentralized network. Given a total system bandwidth of W Hz and ...
Nihar Jindal, Jeffrey G. Andrews, Steven Weber