Sciweavers

1411 search results - page 253 / 283
» Privacy-Enhanced Web Personalization
Sort
View
PAAPP
2007
109views more  PAAPP 2007»
13 years 7 months ago
Relation rule mining
\Web users are nowadays confronted with the huge variety of available information sources whose content is not targeted at any specific group or layer. Recommendation systems aim...
Mehdi Adda, Rokia Missaoui, Petko Valtchev
IEEECIT
2010
IEEE
13 years 6 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
SAC
2004
ACM
14 years 1 months ago
GD-GhOST: a goal-oriented self-tuning caching algorithm
A popular solution to internet performance problems is the widespread caching of data. Many caching algorithms have been proposed in the literature, most attempting to optimize fo...
Ganesh Santhanakrishnan, Ahmed Amer, Panos K. Chry...
SIGUCCS
1998
ACM
13 years 12 months ago
The ResNet Obstacle Course
There are many ways to train student employees, but hands-on experience is invaluable. To provide our Resident Computer Consultants (RCCs) with the experience they need to solve t...
Kathleen A. Hausmann
EUROSYS
2008
ACM
14 years 4 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman