Sciweavers

185 search results - page 10 / 37
» Efficiently computing private recommendations
Sort
View
UIC
2007
Springer
15 years 3 months ago
Ontology-Based Semantic Recommendation for Context-Aware E-Learning
Nowadays, e-learning systems are widely used for education and training in universities and companies because of their electronic course content access and virtual classroom partic...
Zhiwen Yu, Yuichi Nakamura, Seiie Jang, Shoji Kaji...
79
Voted
SAC
2006
ACM
14 years 9 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
IJNSEC
2008
115views more  IJNSEC 2008»
14 years 9 months ago
A Simple User Authentication Scheme for Grid Computing
The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for us...
Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, Xiaohui L...
81
Voted
MOBISYS
2008
ACM
14 years 12 months ago
Transient customization of mobile computing infrastructure
Kimberley enables rapid software provisioning of fixed infrastructure for transient use by a mobile device. It uses virtual machine (VM) technology, but avoids the performance cha...
Adam Wolbach, Jan Harkes, Srinivas Chellappa, Maha...
CCS
2010
ACM
14 years 10 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...