Sciweavers

354 search results - page 36 / 71
» Personal Data in a Large Digital Library
Sort
View
PLDI
2011
ACM
12 years 11 months ago
Language-independent sandboxing of just-in-time compilation and self-modifying code
When dealing with dynamic, untrusted content, such as on the Web, software behavior must be sandboxed, typically through use of a language like JavaScript. However, even for such ...
Jason Ansel, Petr Marchenko, Úlfar Erlingss...
WPES
2003
ACM
14 years 1 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
ENTER
2008
Springer
13 years 10 months ago
Evaluating Recommender Systems in Tourism - A Case Study from Austria
Recommender systems (RS) are employed to personalize user interaction with (e.g. tourism) web-sites, supporting both navigation through large service assortments and the configura...
Markus Zanker, Matthias Fuchs, Wolfram Höpken...
KDD
2012
ACM
220views Data Mining» more  KDD 2012»
11 years 11 months ago
ComSoc: adaptive transfer of user behaviors over composite social network
Accurate prediction of user behaviors is important for many social media applications, including social marketing, personalization and recommendation, etc. A major challenge lies ...
ErHeng Zhong, Wei Fan, Junwei Wang, Lei Xiao, Yong...
DRM
2004
Springer
14 years 2 months ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman