Sciweavers

1018 search results - page 88 / 204
» Remote User Authentication Using Public Information
Sort
View
SRDS
2010
IEEE
13 years 6 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
CCS
2007
ACM
14 years 2 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
IRI
2007
IEEE
14 years 2 months ago
Adapting Ratings in Memory-Based Collaborative Filtering using Linear Regression
We show that the standard memory-based collaborative filtering rating prediction algorithm using the Pearson correlation can be improved by adapting user ratings using linear reg...
Jérôme Kunegis, Sahin Albayrak
SEMWEB
2009
Springer
14 years 2 months ago
Exploiting User Feedback to Improve Semantic Web Service Discovery
State-of-the-art discovery of Semantic Web services is based on hybrid algorithms that combine semantic and syntactic matchmaking. These approaches are purely based on similarity m...
Anna Averbakh, Daniel Krause, Dimitrios Skoutas
JAISE
2010
169views Algorithms» more  JAISE 2010»
13 years 2 months ago
Responsive environments: User experiences for ambient intelligence
In this paper we review the emerging field of responsive environments as an ambient intelligence system with a focus on user experience. We see responsive environments as a combina...
Jorge Alves Lino, Benjamin Salem, Matthias Rauterb...