Sciweavers

344 search results - page 43 / 69
» trust 2009
Sort
View
RECSYS
2009
ACM
14 years 1 months ago
MoviExplain: a recommender system with explanations
Providing justification to a recommendation gives credibility to a recommender system. Some recommender systems (Amazon.com etc.) try to explain their recommendations, in an eff...
Panagiotis Symeonidis, Alexandros Nanopoulos, Yann...
FC
2009
Springer
84views Cryptology» more  FC 2009»
14 years 15 days ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersec...
Jan Camenisch, Gregory M. Zaverucha
AIIA
2009
Springer
14 years 2 days ago
Representing Excuses in Social Dependence Networks
In this paper, we propose a representation of excuses in the context of multiagent systems. We distinguish five classes of excuses, taking as starting point both jurisprudential an...
Guido Boella, Jan Broersen, Leendert van der Torre...
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 9 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
GECCO
2010
Springer
225views Optimization» more  GECCO 2010»
13 years 8 months ago
Comparison of NEWUOA with different numbers of interpolation points on the BBOB noiseless testbed
In this paper, we study the performances of the NEW Unconstrained Optimization Algorithm (NEWUOA) with different numbers of interpolation points. NEWUOA is a trust region method, ...
Raymond Ros