Sciweavers

185 search results - page 22 / 37
» Efficiently computing private recommendations
Sort
View
ACSE
2000
ACM
15 years 2 months ago
A streamlined system for building online presentation archives using SMIL
The demand for and expectation of ubiquitous access to multimedia online learning resources are much higher amongst computer science students than other fields of study. Previous ...
Darren James, Jane Hunter
92
Voted
WWW
2007
ACM
15 years 10 months ago
Information flow modeling based on diffusion rate for prediction and ranking
Information flows in a network where individuals influence each other. The diffusion rate captures how efficiently the information can diffuse among the users in the network. We p...
Xiaodan Song, Yun Chi, Koji Hino, Belle L. Tseng
WWW
2008
ACM
15 years 10 months ago
Service-oriented data denormalization for scalable web applications
Many techniques have been proposed to scale web applications. However, the data interdependencies between the database queries and transactions issued by the applications limit th...
Zhou Wei, Dejun Jiang, Guillaume Pierre, Chi-Hung ...
OPODIS
2004
14 years 11 months ago
Firewall Queries
Firewalls are crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is t...
Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H...
UAI
2004
14 years 11 months ago
Sequential Information Elicitation in Multi-Agent Systems
We introduce the study of sequential information elicitation in strategic multi-agent systems. In an information elicitation setup a center attempts to compute the value of a func...
Rann Smorodinsky, Moshe Tennenholtz