Sciweavers

1945 search results - page 133 / 389
» Survivable Information Storage Systems
Sort
View
RECSYS
2009
ACM
14 years 2 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
IIR
2010
13 years 11 months ago
Thinking of a System for Image Retrieval
Increasing applications are demanding effective and efficient support to perform retrieval in large collections of digital images. The work presented here is an early stage resear...
Giovanna Castellano, Gianluca Sforza, Maria Alessa...
SAC
2008
ACM
13 years 9 months ago
Web service access management for integration with agent systems
The agent paradigm includes the notion that agents interact with services. This paper identifies the need for controlled access to such services, from the perspective of agent sys...
Benno J. Overeinder, P. D. Verkaik, Frances M. T. ...
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
14 years 10 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
IIWAS
2008
13 years 11 months ago
On-the-fly collaboration in distributed systems through service semantic overlay
In the recent years distributed architectures and P2P technology have been adopted to better support effective collaboration among networked organizations. According to the P2P pa...
Devis Bianchini, Valeria De Antonellis, Michele Me...