Sciweavers

881 search results - page 29 / 177
» Secure Personal Data Servers: a Vision Paper
Sort
View
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
14 years 1 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
CCS
2009
ACM
14 years 8 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
PUC
2007
154views more  PUC 2007»
13 years 7 months ago
Point-of-capture archiving and editing of personal experiences from a mobile device
Personal experience computing is an emerging research area in computing support for capturing, archiving, editing, and utilizing of digital personal experiences. This paper presen...
Chon-in Wu, Chao-ming Teng, Yi-Chao Chen, Tung-yun...
WSDM
2010
ACM
236views Data Mining» more  WSDM 2010»
14 years 5 months ago
Personalized Click Prediction in Sponsored Search
Sponsored search is a multi-billion dollar business that generates most of the revenue for search engines. Predicting the probability that users click on ads is crucial to sponsor...
Erick Cantú-Paz, Haibin Cheng
WSDM
2010
ACM
214views Data Mining» more  WSDM 2010»
14 years 5 months ago
Pairwise Interaction Tensor Factorization for Personalized Tag Recommendation
Tagging plays an important role in many recent websites. Recommender systems can help to suggest a user the tags he might want to use for tagging a specific item. Factorization mo...
Steffen Rendle, Lars Schmidt-Thieme