Sciweavers

905 search results - page 98 / 181
» The Case Against Micropayments
Sort
View
RECSYS
2009
ACM
14 years 3 months ago
Getting recommender systems to think outside the box
We examine the case of over-specialization in recommender systems, which results from returning items that are too similar to those previously rated by the user. We propose Outsid...
Zeinab Abbassi, Sihem Amer-Yahia, Laks V. S. Laksh...
ACSC
2008
IEEE
14 years 3 months ago
A Local Broker enabled MobiPass architecture for enhancing trusted interaction efficiency
While mobile computing provides a potentially vast business opportunity for many industry participants, it also raises issues such as security and performance. This paper proposes...
Will Tao, Robert Steele
CDC
2008
IEEE
140views Control Systems» more  CDC 2008»
14 years 3 months ago
Reachability calculations for automated aerial refueling
— This paper describes reachability calculations for a hybrid system formalism governing UAVs interacting with another vehicle in a safety-critical situation. We examine this pro...
Jerry Ding, Jonathan Sprinkle, Shankar S. Sastry, ...
DSN
2008
IEEE
14 years 3 months ago
SymPLFIED: Symbolic program-level fault injection and error detection framework
This paper introduces SymPLFIED, a program-level framework which allows specification of arbitrary error detectors and the verification of their efficacy against hardware errors. ...
Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalba...
DSN
2008
IEEE
14 years 3 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...