Sciweavers

323 search results - page 46 / 65
» Doing it right
Sort
View
91
Voted
ICIP
2009
IEEE
16 years 25 days ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
ICDM
2008
IEEE
141views Data Mining» more  ICDM 2008»
15 years 6 months ago
Scalable Tensor Decompositions for Multi-aspect Data Mining
Modern applications such as Internet traffic, telecommunication records, and large-scale social networks generate massive amounts of data with multiple aspects and high dimensiona...
Tamara G. Kolda, Jimeng Sun
IPPS
2006
IEEE
15 years 5 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti
EAAI
2007
87views more  EAAI 2007»
14 years 11 months ago
Experience-based service provider selection in agent-mediated E-Commerce
For a given service demand, it is necessary to select a suitable service provider among many possibilities. An accurate selection is difficult when consumers do not have a signi...
Murat Sensoy, F. Canan Pembe, Hande Zirtiloglu, Pi...
CIKM
2010
Springer
14 years 10 months ago
Ranking related entities: components and analyses
Related entity finding is the task of returning a ranked list of homepages of relevant entities of a specified type that need to engage in a given relationship with a given sour...
Marc Bron, Krisztian Balog, Maarten de Rijke