Sciweavers

1898 search results - page 334 / 380
» Weak Keys for IDEA
Sort
View
RECSYS
2009
ACM
14 years 3 months ago
An incentive-based architecture for social recommendations
We present an incentive-based architecture for providing recommendations in a social network. We maintain a distinct reputation system for each individual and we rely on users to ...
Rajat Bhattacharjee, Ashish Goel, Konstantinos Kol...
SACMAT
2009
ACM
14 years 3 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
SIGIR
2009
ACM
14 years 3 months ago
Positional language models for information retrieval
Although many variants of language models have been proposed for information retrieval, there are two related retrieval heuristics remaining “external” to the language modelin...
Yuanhua Lv, ChengXiang Zhai
CDC
2008
IEEE
14 years 3 months ago
Convex duality and entropy-based moment closures: Characterizing degenerate densities
A common method for constructing a function from a finite set of moments is to solve a constrained minimization problem. The idea is to find, among all functions with the given ...
Cory D. Hauck, C. David Levermore, André L....
HICSS
2008
IEEE
192views Biometrics» more  HICSS 2008»
14 years 3 months ago
Agent-Based Electricity Balancing with Distributed Energy Resources, A Multiperspective Case Study
Abstract— Distributed generation (DG) of electricity is providing an increasing part of the worldwide electricity supply. At the same time, there is a big potential of demand res...
Koen Kok, Zsófia Derzsi, Jaap Gordijn, Maar...