Sciweavers

2097 search results - page 139 / 420
» Distributed user modelling for universal information access
Sort
View
141
Voted
ISI
2006
Springer
15 years 5 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
167
Voted
IPM
2007
182views more  IPM 2007»
15 years 5 months ago
A probabilistic music recommender considering user opinions and audio features
A recommender system has an obvious appeal in an environment where the amount of on-line information vastly outstrips any individual’s capability to survey. Music recommendation...
Qing Li, Sung-Hyon Myaeng, Byeong Man Kim
CAISE
2003
Springer
15 years 10 months ago
Ubiquitous Usability: Exploring Mobile Interfaces within the Context of a Theoretical Model
Mobile commerce (m-Commerce), which allows for anytime/anywhere access to information and services, shows great potential. Ubiquitous access to information systems is critical to e...
Khaled Hassanein, Milena M. Head
131
Voted
UIST
2004
ACM
15 years 10 months ago
Who cares?: reflecting who is reading what on distributed community bulletin boards
In this paper, we describe the YeTi information sharing system that has been designed to foster community building through informal digital content sharing. The YeTi system is a g...
Toshiya Yamada, Jun Shingu, Elizabeth F. Churchill...
112
Voted
ANSS
2001
IEEE
15 years 8 months ago
New Multiprotocol WDM/CDMA-Based Optical Switch Architecture
Different switching techniques have been proposed to design optical switch architectures. Wave Division Multiplexing (WDM) techniques were extensively investigated to implement sw...
Driss Benhaddou, Ala I. Al-Fuqaha, Ghulam Chaudhry