Sciweavers

947 search results - page 133 / 190
» HMM-Based Trust Model
Sort
View
JTAER
2010
147views more  JTAER 2010»
14 years 11 months ago
Privacy Issues for Online Personal Photograph Collections
Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible online digital multi-media collections. Howeve...
Sally Jo Cunningham, Masood Masoodian, Anne Adams
117
Voted
SDM
2010
SIAM
217views Data Mining» more  SDM 2010»
14 years 11 months ago
Collaborative Filtering: Weighted Nonnegative Matrix Factorization Incorporating User and Item Graphs
Collaborative filtering is an important topic in data mining and has been widely used in recommendation system. In this paper, we proposed a unified model for collaborative fil...
Quanquan Gu, Jie Zhou, Chris H. Q. Ding
121
Voted
CODASPY
2012
13 years 8 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
89
Voted
COMPSAC
2002
IEEE
15 years 5 months ago
Multi-Criteria Preference Analysis for Systematic Requirements Negotiation
Many software projects have failed because their requirements were poorly negotiated among stakeholders. This paper proposes a systematic model, called "MultiCriteria Prefere...
Hoh Peter In, David Olson, Tom Rodgers
92
Voted
AAAI
2007
15 years 2 months ago
Reasoning about Attribute Authenticity in a Web Environment
The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. How...
Thomas Wölfl