Sciweavers

511 search results - page 88 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
CORR
2011
Springer
196views Education» more  CORR 2011»
14 years 3 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
LSO
2004
Springer
15 years 5 months ago
Embedding Experiences in Micro-didactical Arrangements
Experience-based Information Systems (EbIS) enable organizations to capture, store and reuse knowledge and experiences for continuous competence development. However, there are sev...
Eric Ras, Stephan Weibelzahl
HT
2010
ACM
15 years 4 months ago
Conversational tagging in twitter
Users on Twitter, a microblogging service, started the phenomenon of adding tags to their messages sometime around February 2008. These tags are distinct from those in other Web 2...
Jeff Huang, Katherine M. Thornton, Efthimis N. Eft...
WWW
2005
ACM
16 years 12 days ago
AVATAR: an approach based on semantic reasoning to recommend personalized TV programs
In this paper a TV recommender system called AVATAR (AdVAnce Telematic search of Audiovisual contents by semantic Reasoning) is presented. This tool uses the experience gained in ...
Yolanda Blanco-Fernández, José J. Pa...
OPODIS
2010
14 years 9 months ago
Self-stabilizing (k, r)-Clustering in Wireless Ad-hoc Networks with Multiple Paths
Abstract. Wireless Ad-hoc networks are distributed systems that often reside in error-prone environments. Self-stabilization lets the system recover autonomously from an arbitrary ...
Andreas Larsson, Philippas Tsigas