Sciweavers

2424 search results - page 274 / 485
» A general algorithm for data dependence analysis
Sort
View
RECSYS
2009
ACM
15 years 10 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...
MSWIM
2006
ACM
15 years 10 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
SACMAT
2005
ACM
15 years 9 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...
ICALP
2010
Springer
15 years 9 months ago
Dynamic Programming for Graphs on Surfaces
Abstract. We provide a framework for the design and analysis of dynamic programming algorithms for surface-embedded graphs on n vertices and branchwidth at most k. Our technique ap...
Juanjo Rué, Ignasi Sau, Dimitrios M. Thilik...
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir