Sciweavers

5790 search results - page 930 / 1158
» Distributed programming with distributed authorization
Sort
View
SIGIR
2009
ACM
14 years 5 months ago
Personalized tag recommendation using graph-based ranking on multi-type interrelated objects
Social tagging is becoming increasingly popular in many Web 2.0 applications where users can annotate resources (e.g. Web pages) with arbitrary keywords (i.e. tags). A tag recomme...
Ziyu Guan, Jiajun Bu, Qiaozhu Mei, Chun Chen, Can ...
SIGIR
2009
ACM
14 years 5 months ago
Web derived pronunciations for spoken term detection
Indexing and retrieval of speech content in various forms such as broadcast news, customer care data and on-line media has gained a lot of interest for a wide range of application...
Dogan Can, Erica Cooper, Arnab Ghoshal, Martin Jan...
GLOBECOM
2008
IEEE
14 years 5 months ago
Adaptive Soft Frequency Reuse for Inter-Cell Interference Coordination in SC-FDMA Based 3GPP LTE Uplinks
This paper proposes a decentralized adaptive soft frequency reuse scheme for the uplink of a 4G long-term evolution (LTE) system. While universal frequencies reuse (UFR) is being ...
Xuehong Mao, Amine Maaref, Koon Hoo Teo
ICC
2008
IEEE
136views Communications» more  ICC 2008»
14 years 5 months ago
A Game-Theoretic Framework for Interference Management through Cognitive Sensing
A game theoretic framework is developed in this paper to facilitate inter-cell interference management through cognitive sensing distributively performed by mobile stations (MSs)....
Yingda Chen, Koon Hoo Teo, Shalinee Kishore, Jinyu...
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
14 years 5 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...