Sciweavers

22864 search results - page 4293 / 4573
» An Integrated and
Sort
View
FC
2010
Springer
205views Cryptology» more  FC 2010»
15 years 5 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
15 years 5 months ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
15 years 5 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
PERCOM
2010
ACM
15 years 5 months ago
AutoGait: A mobile platform that accurately estimates the distance walked
—AutoGait is a mobile platform that autonomously discovers a user’s walking profile and accurately estimates the distance walked. The discovery is made by utilizing the GPS in...
Dae-Ki Cho, Min Mun, Uichin Lee, Williams J. Kaise...
EXPCS
2007
15 years 5 months ago
The user in experimental computer systems research
Experimental computer systems research typically ignores the end-user, modeling him, if at all, in overly simple ways. We argue that this (1) results in inadequate performance eva...
Peter A. Dinda, Gokhan Memik, Robert P. Dick, Bin ...
« Prev « First page 4293 / 4573 Last » Next »