Sciweavers

463 search results - page 69 / 93
» Method Tailoring as Negotiation
Sort
View
DSN
2008
IEEE
14 years 4 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
GLOBECOM
2008
IEEE
14 years 4 months ago
A Mobility Prediction-Based Adaptive Data Gathering Protocol for Delay Tolerant Mobile Sensor Network
— The basic operation of Delay Tolerant Mobile Sensor Network (DTMSN) is for pervasive data gathering in networks with intermittent connectivity, where traditional data gathering...
Jinqi Zhu, Jiannong Cao, Ming Liu, Yuan Zheng, Hai...
ICDM
2008
IEEE
183views Data Mining» more  ICDM 2008»
14 years 4 months ago
Collaborative Filtering for Implicit Feedback Datasets
A common task of recommender systems is to improve customer experience through personalized recommendations based on prior implicit feedback. These systems passively track differe...
Yifan Hu, Yehuda Koren, Chris Volinsky
KBSE
2007
IEEE
14 years 4 months ago
Iterative model-driven development of adaptable service-based applications
Flexibility and interoperability make web services well suited for designing highly-customizable reactive service-based applications, that is interactive applications that can be ...
Leen Lambers, Hartmut Ehrig, Leonardo Mariani, Mau...
ESA
2007
Springer
125views Algorithms» more  ESA 2007»
14 years 4 months ago
Online Primal-Dual Algorithms for Maximizing Ad-Auctions Revenue
We study the online ad-auctions problem introduced by Mehta et. al. [15]. We design a (1 − 1/e)competitive (optimal) algorithm for the problem, which is based on a clean primal-...
Niv Buchbinder, Kamal Jain, Joseph Naor