Sciweavers

5787 search results - page 1141 / 1158
» Generic User Modeling Systems
Sort
View
SRDS
2010
IEEE
13 years 6 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
WISE
2010
Springer
13 years 6 months ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach
CORR
2011
Springer
197views Education» more  CORR 2011»
13 years 3 months ago
High-Throughput Transaction Executions on Graphics Processors
OLTP (On-Line Transaction Processing) is an important business system sector in various traditional and emerging online services. Due to the increasing number of users, OLTP syste...
Bingsheng He, Jeffrey Xu Yu
GRAPHICSINTERFACE
2011
12 years 12 months ago
Ubiquitous cursor: a comparison of direct and indirect pointing feedback in multi-display environments
Multi-display environments (MDEs) connect several displays into a single digital workspace. One of the main problems to be solved in an MDE’s design is how to enable movement of...
Robert Xiao, Miguel A. Nacenta, Regan L. Mandryk, ...
INFOCOM
2011
IEEE
12 years 12 months ago
Adaptive wireless channel probing for shared key generation
—Generating a shared key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel ...
Yunchuan Wei, Kai Zeng, Prasant Mohapatra
« Prev « First page 1141 / 1158 Last » Next »