Sciweavers

2650 search results - page 95 / 530
» Personalization in E-Commerce Applications
Sort
View
CCS
2011
ACM
12 years 9 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
WISE
2010
Springer
13 years 7 months ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach
CVPR
2007
IEEE
14 years 11 months ago
Using Group Prior to Identify People in Consumer Images
While face recognition techniques have rapidly advanced in the last few years, most of the work is in the domain of security applications. For consumer imaging applications, perso...
Andrew C. Gallagher, Tsuhan Chen
EDBT
2012
ACM
395views Database» more  EDBT 2012»
11 years 11 months ago
Data management with SAPs in-memory computing engine
We present some architectural and technological insights on SAP’s HANA database and derive research challenges for future enterprise application development. The HANA database m...
Joos-Hendrik Boese, Cafer Tosun, Christian Mathis,...
PCI
2009
Springer
14 years 1 months ago
Exploring Gadget-Based Interfaces for the Social Semantic Desktop
— A large number of tools has recently emerged supporting information management for individuals in their social context. Semantic technologies play an important role in the deve...
Konstantinos Christidis, Niki Papailiou, Gregoris ...