Sciweavers

1018 search results - page 102 / 204
» Remote User Authentication Using Public Information
Sort
View
JCP
2006
117views more  JCP 2006»
13 years 8 months ago
Empirical Analysis of Attribute-Aware Recommender System Algorithms Using Synthetic Data
As the amount of online shoppers grows rapidly, the need of recommender systems for e-commerce sites are demanding, especially when the number of users and products being offered o...
Karen H. L. Tso, Lars Schmidt-Thieme
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 7 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
PAM
2011
Springer
12 years 11 months ago
FACT: Flow-Based Approach for Connectivity Tracking
More than 20 years after the launch of the public Internet, operator forums are still full of reports about temporary unreachability of complete networks. We propose FACT, a system...
Dominik Schatzmann, Simon Leinen, Jochen Köge...
WWW
2009
ACM
14 years 8 months ago
Unsupervised query categorization using automatically-built concept graphs
Automatic categorization of user queries is an important component of general purpose (Web) search engines, particularly for triggering rich, query-specific content and sponsored ...
Eustache Diemert, Gilles Vandelle
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...