Sciweavers

922 search results - page 57 / 185
» Attribute based data sharing with attribute revocation
Sort
View
HIPEAC
2005
Springer
15 years 5 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
ICDE
2009
IEEE
100views Database» more  ICDE 2009»
16 years 1 months ago
Recommendation Diversification Using Explanations
Abstract-- We introduce the novel notion of explanationbased diversification to address the well-known problem of overspecialization in item recommendations. Over-specialization in...
Cong Yu, Laks V. S. Lakshmanan, Sihem Amer-Yahia
KDD
2010
ACM
190views Data Mining» more  KDD 2010»
15 years 3 months ago
User browsing models: relevance versus examination
There has been considerable work on user browsing models for search engine results, both organic and sponsored. The click-through rate (CTR) of a result is the product of the prob...
Ramakrishnan Srikant, Sugato Basu, Ni Wang, Daryl ...
ICDE
2010
IEEE
399views Database» more  ICDE 2010»
15 years 6 months ago
Discovery-driven graph summarization
Abstract— Large graph datasets are ubiquitous in many domains, including social networking and biology. Graph summarization techniques are crucial in such domains as they can ass...
Ning Zhang, Yuanyuan Tian, Jignesh M. Patel
ISCA
2000
IEEE
78views Hardware» more  ISCA 2000»
15 years 4 months ago
On the value locality of store instructions
Value locality, a recently discovered program attribute that describes the likelihood of the recurrence of previously-seen program values, has been studied enthusiastically in the...
Kevin M. Lepak, Mikko H. Lipasti