Sciweavers

2650 search results - page 194 / 530
» Personalization in E-Commerce Applications
Sort
View
SENSYS
2010
ACM
13 years 8 months ago
AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages
We present AutoWitness, a system to deter, detect, and track personal property theft, improve historically dismal stolen property recovery rates, and disrupt stolen property distr...
Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath...
SRDS
2010
IEEE
13 years 8 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
ICC
2009
IEEE
171views Communications» more  ICC 2009»
13 years 8 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
ASPLOS
2009
ACM
14 years 11 months ago
Mixed-mode multicore reliability
Future processors are expected to observe increasing rates of hardware faults. Using Dual-Modular Redundancy (DMR), two cores of a multicore can be loosely coupled to redundantly ...
Philip M. Wells, Koushik Chakraborty, Gurindar S. ...
CVPR
1997
IEEE
15 years 20 days ago
Global Training of Document Processing Systems Using Graph Transformer Networks
We propose a new machine learning paradigm called Graph Transformer Networks that extends the applicability of gradient-based learning algorithms to systems composed of modules th...
Léon Bottou, Yoshua Bengio, Yann LeCun