Sciweavers

8 search results - page 1 / 2
» Finding the Evidence in Tamper-Evident Logs
Sort
View
SADFE
2008
IEEE
13 years 11 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
IUI
2000
ACM
13 years 9 months ago
Learning to recommend from positive evidence
In recent years, many systems and approaches for recommending information, products or other objects have been developed. In these systems, often machine learning methods that nee...
Ingo Schwab, Wolfgang Pohl, Ivan Koychev
STOC
2007
ACM
137views Algorithms» more  STOC 2007»
14 years 5 months ago
Testing k-wise and almost k-wise independence
In this work, we consider the problems of testing whether a distribution over {0, 1}n is k-wise (resp. ( , k)-wise) independent using samples drawn from that distribution. For the...
Noga Alon, Alexandr Andoni, Tali Kaufman, Kevin Ma...
CIKM
2010
Springer
12 years 11 months ago
Predicting short-term interests using activity-based search context
A query considered in isolation offers limited information about a searcher's intent. Query context that considers pre-query activity (e.g., previous queries and page visits)...
Ryen W. White, Paul N. Bennett, Susan T. Dumais
IEAAIE
2007
Springer
13 years 11 months ago
Episodic Memory for Ubiquitous Multimedia Contents Management System
Recently, mobile devices are regarded as a content storage with their functions such as camera, camcorder, and music player. It creates massive new data and downloads contents from...
Kyung-Joong Kim, Myung-Chul Jung, Sung-Bae Cho