Sciweavers

739 search results - page 130 / 148
» Query quality: user ratings and system predictions
Sort
View
IH
2004
Springer
14 years 2 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
NSDI
2007
13 years 11 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
ICDE
2009
IEEE
153views Database» more  ICDE 2009»
13 years 6 months ago
STAIRS: Towards Efficient Full-Text Filtering and Dissemination in a DHT Environment
Nowadays contents in Internet like weblogs, wikipedia and news sites become "live". How to notify and provide users with the relevant contents becomes a challenge. Unlike...
Weixiong Rao, Ada Wai-Chee Fu, Lei Chen 0002, Hanh...
CSB
2005
IEEE
161views Bioinformatics» more  CSB 2005»
14 years 2 months ago
Data Integration in the Mouse Genome Informatics (MGI) Database
The Mouse Genome Informatics (MGI) Database at The Jackson Laboratory provides a comprehensive public resource about the laboratory mouse. MGI curated data types include gene repr...
Donnie Qi, Judith A. Blake, James A. Kadin, Joel E...
UAI
2000
13 years 10 months ago
Collaborative Filtering by Personality Diagnosis: A Hybrid Memory and Model-Based Approach
The growth of Internet commerce has stimulated the use of collaborative filtering (CF) algorithms as recommender systems. Such systems leverage knowledge about the known preferenc...
David M. Pennock, Eric Horvitz, Steve Lawrence, C....