Sciweavers

SAC
2015
ACM
8 years 7 months ago
Bing-SF-IDF+: a hybrid semantics-driven news recommender
Content-based news recommendation is traditionally performed using the cosine similarity and the TF-IDF weighting scheme for terms occurring in news messages and user profiles. S...
Michel Capelle, Marnix Moerland, Frederik Hogenboo...
SAC
2015
ACM
8 years 7 months ago
Oblivious outsourcing of garbled circuit generation
Yao’s garbled circuit technique is often used in outsourced computation. Current approaches divide the computation to two or more servers. The assumption is that the servers col...
Florian Kerschbaum
SAC
2015
ACM
8 years 7 months ago
A reputation system supporting unlinkable, yet authorized expert ratings
Reputation systems used in practice typically either provide robustness or anonymity. A lot of research has been going on to come up with schemes that provide both properties, how...
Andreas Kokoschka, Ronald Petrlic, Christoph Sorge
SAC
2015
ACM
8 years 7 months ago
Multi-component similarity method for web product duplicate detection
Due to the growing number of Web shops, aggregating product data from the Web is growing in importance. One of the problems encountered in product aggregation is duplicate detecti...
Ronald van Bezu, Sjoerd Borst, Rick Rijkse, Jim Ve...
SAC
2015
ACM
8 years 7 months ago
Performance prediction for set similarity joins
Query performance prediction is essential for many important tasks in cloud-based database management including resource provisioning, admission control, and pricing. Recently, th...
Christiane Faleiro Sidney, Diego Sarmento Mendes, ...
SAC
2015
ACM
8 years 7 months ago
pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimation
OWL ontologies are nowadays a quite popular way to describe structured knowledge in terms of classes, relations among classes and class instances. In this paper, given an OWL targ...
Umberto Straccia, Matteo Mucci
SAC
2015
ACM
8 years 7 months ago
SmartAuth: dynamic context fingerprinting for continuous user authentication
As recent incidents have shown, weak passwords are a severe security risk for authenticating users and granting access to protected resources. Additionally, strong passwords score...
Davy Preuveneers, Wouter Joosen
SAC
2015
ACM
8 years 7 months ago
SecSess: keeping your session tucked away in your browser
Session management is a crucial component in every modern web application. It links subsequent requests and temporary stateful information together, enabling a rich and interactiv...
Philippe De Ryck, Lieven Desmet, Frank Piessens, W...
SAC
2015
ACM
8 years 7 months ago
Predictability in human-agent cooperation: adapting to humans' personalities
Making artificial agents a constituent part of human activities leads to more affiliated teamwork scenarios and at the same time introduces several new challenges. One challenge ...
Sebastian Ahrndt, Benjamin Breitung, Johannes F&au...
SAC
2015
ACM
8 years 7 months ago
Automated software winnowing
The strong isolation guarantees of hardware virtualization have led to its widespread use. A consequence of this is that individual partitions contain much software that is design...
Gregory Malecha, Ashish Gehani, Natarajan Shankar