Sciweavers

40 search results - page 5 / 8
» An Agent-Based Approach to Inference Prevention in Distribut...
Sort
View
WPES
2003
ACM
15 years 2 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
15 years 10 months ago
Modeling relationships at multiple scales to improve accuracy of large recommender systems
The collaborative filtering approach to recommender systems predicts user preferences for products or services by learning past useritem relationships. In this work, we propose no...
Robert M. Bell, Yehuda Koren, Chris Volinsky
ICDCS
1999
IEEE
15 years 1 months ago
Beyond the Black Box: Event-based Inter-Process Communication in Process Support Systems
Existing workflow management systems encapsulate the data and behavior of a process within its execution scope, preventing other processes from accessing this information until th...
Claus Hagen, Gustavo Alonso
72
Voted
BC
1998
117views more  BC 1998»
14 years 9 months ago
Where did I take that snapshot? Scene-based homing by image matching
In homing tasks, the goal is often not marked by visible objects but must be inferred from the spatial relation to the visual cues in the surrounding scene. The exact computation o...
Matthias O. Franz, Bernhard Schölkopf, Hanspe...
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
15 years 11 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu