Sciweavers

5130 search results - page 865 / 1026
» Constraint Query Languages
Sort
View
143
Voted
RECSYS
2009
ACM
15 years 10 months ago
Regret-based optimal recommendation sets in conversational recommender systems
Current conversational recommender systems are unable to offer guarantees on the quality of their recommendations due to a lack of principled user utility models. We develop an ap...
Paolo Viappiani, Craig Boutilier
DCC
2008
IEEE
15 years 9 months ago
Shared Descriptions Fusion Coding for Storage and Selective Retrieval of Correlated Sources
Motivated by sensor networks, we consider the fusion storage of correlated sources in a database, such that any subset of them may be efficiently retrieved in the future. Only st...
Sharadh Ramaswamy, Kenneth Rose
139
Voted
INFOCOM
2008
IEEE
15 years 9 months ago
HERO: Online Real-Time Vehicle Tracking in Shanghai
—Intelligent transportation systems have become increasingly important for the public transportation in Shanghai. In response, ShanghaiGrid (SG) aims to provide abundant intellig...
Hongzi Zhu, Yanmin Zhu, Minglu Li, Lionel M. Ni
144
Voted
COMPSAC
2007
IEEE
15 years 9 months ago
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a ...
Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, ...
NCA
2007
IEEE
15 years 9 months ago
FRAC: Implementing Role-Based Access Control for Network File Systems
We present FRAC, a Framework for Role-based Access Control in network file systems. FRAC is a reference monitor that controls the message flow between file system clients and s...
Aniruddha Bohra, Stephen Smaldone, Liviu Iftode