Sciweavers

292 search results - page 21 / 59
» Exploiting Dead Value Information
Sort
View
SIGECOM
2004
ACM
115views ECommerce» more  SIGECOM 2004»
14 years 28 days ago
Limited reputation sharing in P2P systems
The increasing popularity of resource exchange through peerto-peer networks has encouraged the development of ways to support more complex commercial transactions over these netwo...
Sergio Marti, Hector Garcia-Molina
TIM
2010
108views Education» more  TIM 2010»
13 years 2 months ago
Reversible Watermarking by Modulation and Security Enhancement
This paper presents a watermarking algorithm that is suitable for the data represented in floating- or fixed-point numbers. By keeping the modulation information, every value in th...
Hao-Tian Wu, Yiu-ming Cheung
ICDE
2004
IEEE
115views Database» more  ICDE 2004»
14 years 8 months ago
Go Green: Recycle and Reuse Frequent Patterns
In constrained data mining, users can specify constraints that can be used to prune the search space to avoid mining uninteresting knowledge. Since it is difficult to determine th...
Gao Cong, Beng Chin Ooi, Kian-Lee Tan, Anthony K. ...
RECSYS
2009
ACM
14 years 2 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...
WWW
2007
ACM
14 years 8 months ago
A kernel based structure matching for web services search
This paper describes a kernel based Web Services (abbreviated as service) matching mechanism for service discovery and integration. The matching mechanism tries to exploit the lat...
Yu Jianjun, Guo Shengmin, Su Hao, Zhang Hui, Xu Ke