Sciweavers

823 search results - page 131 / 165
» A Graph-Theoretic Analysis of Information Value
Sort
View
FC
2005
Springer
142views Cryptology» more  FC 2005»
15 years 7 months ago
Testing Disjointness of Private Datasets
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we ...
Aggelos Kiayias, Antonina Mitrofanova
IUI
2010
ACM
15 years 7 months ago
Towards a reputation-based model of social web search
While web search tasks are often inherently collaborative in nature, many search engines do not explicitly support collaboration during search. In this paper, we describe HeyStaks...
Kevin KcNally, Michael P. O'Mahony, Barry Smyth, M...
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
15 years 7 months ago
Telecommunication Infrastructure Investments and Firm Performance
This research adopts Barua’s [1] three-tier Business Value Complementarity (BVC) model to study the performance of telephone companies (Telcos). Our study integrates constructs ...
Hy Sonya Hsu, Siva K. Balasubramanian
DIM
2009
ACM
15 years 6 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
EDBT
2009
ACM
81views Database» more  EDBT 2009»
15 years 6 months ago
Exploiting similarity-aware grouping in decision support systems
Decision Support Systems (DSS) are information systems that support decision making processes. In many scenarios these systems are built on top of data managed by DBMSs and make e...
Yasin N. Silva, Muhammad U. Arshad, Walid G. Aref