Sciweavers

1298 search results - page 139 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
137
Voted
AAAI
2006
15 years 5 months ago
Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks
The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-...
Bamshad Mobasher, Robin D. Burke, Jeff J. Sandvig
130
Voted
ICMCS
2005
IEEE
132views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Approximating the selectivity of multimedia range queries
This paper introduces a new approach of approximating the selectivity of multimedia range queries. Estimating the selectivity of a range query is a pre-requisite to optimize a mul...
Mario Döller, Harald Kosch
134
Voted
EUROSYS
2006
ACM
16 years 21 days ago
On the road to recovery: restoring data after disasters
—Restoring data operations after a disaster is a daunting task: how should recovery be performed to minimize data loss and application downtime? Administrators are under consider...
Kimberly Keeton, Dirk Beyer 0002, Ernesto Brau, Ar...
188
Voted
SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
16 years 3 months ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer
ADAPTIVE
2007
Springer
15 years 9 months ago
Data Mining for Web Personalization
Abstract. In this chapter we present an overview of Web personalization process viewed as an application of data mining requiring support for all the phases of a typical data minin...
Bamshad Mobasher