Sciweavers

2795 search results - page 545 / 559
» Recommended or Not
Sort
View
IEEESP
2010
101views more  IEEESP 2010»
13 years 6 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato
IFIPTM
2010
113views Management» more  IFIPTM 2010»
13 years 6 months ago
Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems
Ranking systems such as those in product review sites and recommender systems usually use ratings to rank favorite items based on both their quality and popularity. Since higher ra...
Le-Hung Vu, Thanasis G. Papaioannou, Karl Aberer
INTERACTIONS
2010
97views more  INTERACTIONS 2010»
13 years 6 months ago
Design challenge based learning (DCBL) and sustainable pedagogical practice
s on Human Factors in Computing Systems. CHI ‘07. New York: ACM, 2007. university environment at scale, with structure, and with rigor. The notion of studio culture and learning ...
Eli Blevis
JSAC
2010
131views more  JSAC 2010»
13 years 6 months ago
BGP Add-Paths: The Scaling/Performance Tradeoffs
— Internet Service Providers design their network with resiliency in mind, having multiple paths towards external IP subnets available at the borders of their network. However, w...
Virginie Van den Schrieck, Pierre François,...
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 6 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...