Sciweavers

41 search results - page 5 / 9
» Hierarchical combination of intruder theories
Sort
View
CSFW
2009
IEEE
15 years 3 months ago
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
Ralf Küsters, Tomasz Truderung
RECSYS
2009
ACM
15 years 6 months ago
Improving rating estimation in recommender systems using aggregation- and variance-based hierarchical models
Previous work on using external aggregate rating information showed that this information can be incorporated in several different types of recommender systems and improves their...
Akhmed Umyarov, Alexander Tuzhilin
UAI
2007
15 years 27 days ago
A System for Ontologically-Grounded Probabilistic Matching
This paper is part of a project to match descriptions of real-world instances and probabilistic models, both of which can be described at mulvel of abstraction and detail. We use ...
Rita Sharma, David Poole, Clinton Smyth
CHI
2003
ACM
16 years 3 days ago
Cognitive strategies and eye movements for searching hierarchical computer displays
This research investigates the cognitive strategies and eye movements that people use to search for a known item in a hierarchical computer display. Computational cognitive models...
Anthony J. Hornof, Tim Halverson
SIGIR
2004
ACM
15 years 5 months ago
A nonparametric hierarchical bayesian framework for information filtering
Information filtering has made considerable progress in recent years.The predominant approaches are content-based methods and collaborative methods. Researchers have largely conc...
Kai Yu, Volker Tresp, Shipeng Yu