Sciweavers

81 search results - page 13 / 17
» Trust as a Key to Improving Recommendation Systems
Sort
View
WIMOB
2008
IEEE
14 years 3 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg
BTW
2009
Springer
114views Database» more  BTW 2009»
13 years 12 months ago
Efficient Verification of B-tree Integrity
: The integrity of B-tree structures can become compromised for many reasons. Since these inconsistencies manifest themselves in unpredictable ways, all commercial database managem...
Goetz Graefe, R. Stonecipher
JOC
2010
106views more  JOC 2010»
13 years 7 months ago
A Taxonomy of Pairing-Friendly Elliptic Curves
Elliptic curves with small embedding degree and large prime-order subgroup are key ingredients for implementing pairingbased cryptographic systems. Such “pairing-friendly” curv...
David Freeman, Michael Scott, Edlyn Teske
ICML
2004
IEEE
14 years 9 months ago
Unifying collaborative and content-based filtering
Collaborative and content-based filtering are two paradigms that have been applied in the context of recommender systems and user preference prediction. This paper proposes a nove...
Justin Basilico, Thomas Hofmann
MICRO
2007
IEEE
79views Hardware» more  MICRO 2007»
14 years 2 months ago
Time Interpolation: So Many Metrics, So Few Registers
The performance of computer systems varies over the course of their execution. A system may perform well during some parts of its execution and poorly during others. To understand...
Todd Mytkowicz, Peter F. Sweeney, Matthias Hauswir...