Sciweavers

1705 search results - page 246 / 341
» Introduction to recommender systems
Sort
View
JOC
2010
106views more  JOC 2010»
14 years 8 months ago
A Taxonomy of Pairing-Friendly Elliptic Curves
Elliptic curves with small embedding degree and large prime-order subgroup are key ingredients for implementing pairingbased cryptographic systems. Such “pairing-friendly” curv...
David Freeman, Michael Scott, Edlyn Teske
90
Voted
GI
2010
Springer
14 years 7 months ago
Elicitation of Preferences for Web Service Compositions
Abstract: Preference elicitation is often used in e-services to create product recommendations for their customers. We present an approach for applying preference elicitation techn...
Carolin Michels, Sudhir Agarwal
EMINDS
2011
244views more  EMINDS 2011»
14 years 5 months ago
A Framework for Designers to Support Prospective Design
In this paper, we analyze the term ”prospective design” from various perspectives. The theoretical-, research- and empirical-based approximations are centralized. Furthermore, ...
Udo Schubert
FI
2011
96views more  FI 2011»
14 years 5 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
IJBIDM
2011
127views more  IJBIDM 2011»
14 years 5 months ago
WebUser: mining unexpected web usage
: Web usage mining has been much concentrated on the discovery of relevant user behaviours from Web access record data. In this paper, we present WebUser, an approach to discover u...
Dong (Haoyuan) Li, Anne Laurent, Pascal Poncelet