Sciweavers

3021 search results - page 482 / 605
» Trust in recommender systems
Sort
View
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 7 months ago
Efficient Biometric Verification in Encrypted Domain
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biomet...
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan...
DALT
2010
Springer
13 years 5 months ago
Understanding Permissions through Graphical Norms
Abstract. Norm-aware agents are able to reason about the obligations, permissions and prohibitions that affect their operation. While much work has focused on the creation of such ...
Nir Oren, Madalina Croitoru, Simon Miles, Michael ...
CICLING
2011
Springer
13 years 1 months ago
Wikipedia Vandalism Detection: Combining Natural Language, Metadata, and Reputation Features
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
B. Thomas Adler, Luca de Alfaro, Santiago Mois&eac...
POST
2012
218views more  POST 2012»
12 years 5 months ago
A Core Calculus for Provenance
Provenance is an increasing concern due to the revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer sys...
Umut A. Acar, Amal Ahmed, James Cheney, Roly Perer...
ICDE
2009
IEEE
158views Database» more  ICDE 2009»
14 years 11 months ago
An Integrated Approach to Performance Monitoring for Autonomous Tuning
With an ever growing complexity and data volume, the administration of today's relational database management systems has become one of the most important cost factors in thei...
Alexander Thiem, Kai-Uwe Sattler