Sciweavers

853 search results - page 113 / 171
» Web user de-identification in personalization
Sort
View
ELPUB
1999
ACM
14 years 2 months ago
Mass-Customizing Electronic Journals
The evolution of the WWW has opened the way to putting information at the fingertips of the whole world with very little effort. As the amount of information available grows, ther...
M. Carmen Fernández Panadero, Andrés...
GECCO
2007
Springer
308views Optimization» more  GECCO 2007»
14 years 4 months ago
Multiobjective clustering with automatic k-determination for large-scale data
Web mining - data mining for web data - is a key factor of web technologies. Especially, web behavior mining has attracted a great deal of attention recently. Behavior mining invo...
Nobukazu Matake, Tomoyuki Hiroyasu, Mitsunori Miki...
DMIN
2007
161views Data Mining» more  DMIN 2007»
13 years 11 months ago
Efficient Summarization Based On Categorized Keywords
—The information that exists on the World Wide Web is enormous enough in order to distract the users when trying to find useful information. In order to overcome the large amount...
Christos Bouras, Vassilis Poulopoulos, Vassilis Ts...
ACSAC
2006
IEEE
14 years 4 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
SIGCOMM
2012
ACM
12 years 13 days ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...