Sciweavers

12373 search results - page 269 / 2475
» Semi-Logarithmic Number Systems
Sort
View
RECSYS
2009
ACM
15 years 9 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
CIKM
2001
Springer
15 years 9 months ago
Managing Trust in a Peer-2-Peer Information System
Managing trust is a problem of particular importance in peer-to-peer environments where one frequently encounters unknown agents. Existing methods for trust management, that are b...
Karl Aberer, Zoran Despotovic
AGENTS
2000
Springer
15 years 8 months ago
Scalability of a Transactional Infrastructure for Multi-Agent Systems
Abstract. One of the reasons for attending to agent technology is the evergrowing complexity of information systems and the increasing difficulty to foresee and plan for all potent...
Khaled Nagi
WACC
1999
ACM
15 years 8 months ago
SaveMe: a system for archiving electronic documents using messaging groupware
Today, organizations deal with an ever-increasing number of documents that have to be archived because they are either related to their core business (e.g., product designs) or ne...
Stefan Berchtold, Alexandros Biliris, Euthimios Pa...
WIDM
1999
ACM
15 years 8 months ago
An Efficient Plan Execution System for Information Management Agents
Recent work on information integration has yielded novel and efficient solutions for gathering data from the World Wide Web. However, there has been little attention given to the ...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...