Sciweavers

6137 search results - page 159 / 1228
» Securing Collaborative Applications
Sort
View
JNW
2008
126views more  JNW 2008»
13 years 10 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
14 years 1 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa
ICDCS
1997
IEEE
14 years 2 months ago
Concurrency Control and View Notification Algorithms for Collaborative Replicated Objects
—This paper describes algorithms for implementing a high-level programming model for synchronous distributed groupware applications. In this model, several application data objec...
Robert E. Strom, Guruduth Banavar, Kevan Miller, A...
CIKM
2001
Springer
14 years 2 months ago
Selecting Relevant Instances for Efficient and Accurate Collaborative Filtering
Collaborative filtering uses a database about consumers’ preferences to make personal product recommendations and is achieving widespread success in both E-Commerce and Informat...
Kai Yu, Xiaowei Xu, Martin Ester, Hans-Peter Krieg...
JUCS
2008
129views more  JUCS 2008»
13 years 10 months ago
The Remote Control Approach - An Architecture for Adaptive Scripting across Collaborative Learning Environments
: In this article we present an architecture for the integration of tutoring approaches and process scaffolds into existing collaborative applications. The architecture allows to c...
Andreas Harrer, Nils Malzahn, Astrid Wichmann