Sciweavers

185 search results - page 10 / 37
» Efficiently computing private recommendations
Sort
View
UIC
2007
Springer
14 years 25 days ago
Ontology-Based Semantic Recommendation for Context-Aware E-Learning
Nowadays, e-learning systems are widely used for education and training in universities and companies because of their electronic course content access and virtual classroom partic...
Zhiwen Yu, Yuichi Nakamura, Seiie Jang, Shoji Kaji...
SAC
2006
ACM
13 years 6 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 6 months ago
A Simple User Authentication Scheme for Grid Computing
The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for us...
Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, Xiaohui L...
MOBISYS
2008
ACM
13 years 9 months ago
Transient customization of mobile computing infrastructure
Kimberley enables rapid software provisioning of fixed infrastructure for transient use by a mobile device. It uses virtual machine (VM) technology, but avoids the performance cha...
Adam Wolbach, Jan Harkes, Srinivas Chellappa, Maha...
CCS
2010
ACM
13 years 7 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...