Sciweavers

1745 search results - page 186 / 349
» A Context-Based Model of Attention
Sort
View
104
Voted
FC
1998
Springer
156views Cryptology» more  FC 1998»
15 years 5 months ago
Assessment of Threats for Smart Card Based Electronic Cash
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the imp...
Kazuo J. Ezawa, Gregory Napiorkowski
90
Voted
ISCNZ
1996
IEEE
15 years 4 months ago
Escalation in IT Projects: Can We Afford to Quit or do We Have to Continue?
: Many information technology (IT) projects fail. These projects are not within budget, not on time or do not deliver what was promised. Failures in IT projects are more common tha...
Urban Nuldén
ICDE
2007
IEEE
114views Database» more  ICDE 2007»
15 years 4 months ago
Group Recommending: A methodological Approach based on Bayesian Networks
The problem of building Recommender Systems has attracted considerable attention in recent years, but most recommender systems are designed for recommending items for individuals....
Luis M. de Campos, Juan M. Fernández-Luna, ...
116
Voted
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
15 years 4 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa
99
Voted
CAISE
2006
Springer
15 years 4 months ago
Adaptive Query Formulation to Handle Database Evolution
Databases are continuously evolving environments, where design constructs are added, removed or updated quite often. Research has extensively dealt with the problem of database evo...
George Papastefanatos, Panos Vassiliadis, Yannis V...