Sciweavers

41 search results - page 5 / 9
» Hierarchical combination of intruder theories
Sort
View
CSFW
2009
IEEE
13 years 11 months ago
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
Ralf Küsters, Tomasz Truderung
RECSYS
2009
ACM
14 years 2 months ago
Improving rating estimation in recommender systems using aggregation- and variance-based hierarchical models
Previous work on using external aggregate rating information showed that this information can be incorporated in several different types of recommender systems and improves their...
Akhmed Umyarov, Alexander Tuzhilin
UAI
2007
13 years 8 months ago
A System for Ontologically-Grounded Probabilistic Matching
This paper is part of a project to match descriptions of real-world instances and probabilistic models, both of which can be described at mulvel of abstraction and detail. We use ...
Rita Sharma, David Poole, Clinton Smyth
CHI
2003
ACM
14 years 7 months ago
Cognitive strategies and eye movements for searching hierarchical computer displays
This research investigates the cognitive strategies and eye movements that people use to search for a known item in a hierarchical computer display. Computational cognitive models...
Anthony J. Hornof, Tim Halverson
SIGIR
2004
ACM
14 years 28 days ago
A nonparametric hierarchical bayesian framework for information filtering
Information filtering has made considerable progress in recent years.The predominant approaches are content-based methods and collaborative methods. Researchers have largely conc...
Kai Yu, Volker Tresp, Shipeng Yu