Sciweavers

363 search results - page 67 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
ICDCS
2008
IEEE
14 years 2 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
INFOCOM
2007
IEEE
14 years 2 months ago
Revenue Focused Protection for VOD in DWDM Rings
—New protection schemes for video on demand (VOD) in a DWDM ring network are proposed that employ information per customer. Unlike prior schemes that rely on fixed priorities, th...
Ornan Ori Gerstel, Galen H. Sasaki, Ashok Balasubr...
CCECE
2006
IEEE
13 years 11 months ago
Variable Step-Size Affine Projection Algorithm with a Weighted and Regularized Projection Matrix
This paper presents a forgetting factor scheme for variable step-size affine projection algorithms (APA). The proposed scheme uses a forgetting processed input matrix as the projec...
Tao Dai, Andy Adler, Behnam Shahrrava
AIRWEB
2008
Springer
13 years 9 months ago
A large-scale study of automated web search traffic
As web search providers seek to improve both relevance and response times, they are challenged by the ever-increasing tax of automated search query traffic. Third party systems in...
Gregory Buehrer, Jack W. Stokes, Kumar Chellapilla
SIGIR
2009
ACM
14 years 2 months ago
Learning to recommend with social trust ensemble
As an indispensable technique in the field of Information Filtering, Recommender System has been well studied and developed both in academia and in industry recently. However, mo...
Hao Ma, Irwin King, Michael R. Lyu