Sciweavers

193 search results - page 30 / 39
» Online Subpath Profiling
Sort
View
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
14 years 8 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
C5
2008
IEEE
14 years 2 months ago
MediaDART: A Decentralized Framework for Sharing Multimedia Content
This paper provides an overview of MediaDART, a framework for building online services for distributing and sharing digital media. Inspired by the participative model of Web 2.0, ...
Maurizio Agelli, Orlando Murru
PERVASIVE
2005
Springer
14 years 1 months ago
Context Modeling for Device- and Location-Aware Mobile Web Applications
Ubiquitous Web systems have to deal with varying context information in order to support context awareness. Accomplishing this requirement necessitates gathering, processing and r...
Michael Hinz, Zoltán Fiala
PCI
2001
Springer
14 years 2 days ago
A Knowledge Based Approach on Educational Metadata Use
One of the most rapidly evolving e-services is e-Learning, that is, the creation of advanced educational resources that are accessible on-line and, potentially, offer numerous adva...
Fotis Kokkoras, Demetrios G. Sampson, Ioannis P. V...
HPCA
2000
IEEE
14 years 1 days ago
Modified LRU Policies for Improving Second-Level Cache Behavior
Main memory accesses continue to be a significant bottleneck for applications whose working sets do not fit in second-level caches. With the trend of greater associativity in seco...
Wayne A. Wong, Jean-Loup Baer