Sciweavers

8068 search results - page 1422 / 1614
» Java Data Objects
Sort
View
125
Voted
FC
2005
Springer
142views Cryptology» more  FC 2005»
15 years 8 months ago
Testing Disjointness of Private Datasets
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we ...
Aggelos Kiayias, Antonina Mitrofanova
117
Voted
GFKL
2005
Springer
114views Data Mining» more  GFKL 2005»
15 years 8 months ago
Attribute-aware Collaborative Filtering
One of the key challenges in large information systems such as online shops and digital libraries is to discover the relevant knowledge from the enormous volume of information. Rec...
Karen H. L. Tso, Lars Schmidt-Thieme
109
Voted
IPSN
2005
Springer
15 years 8 months ago
A compact modular wireless sensor platform
— We have designed and constructed a modular platform for use in compact wireless sensing. This platform is based around a series of circuit boards (or panes), each of which inst...
Ari Y. Benbasat, Joseph A. Paradiso
119
Voted
IWDW
2005
Springer
15 years 8 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
93
Voted
OTM
2005
Springer
15 years 8 months ago
Modelling Context Information with ORM
Context-aware applications rely on implicit forms of input, such as sensor-derived data, in order to reduce the need for explicit input from users. They are especially relevant for...
Karen Henricksen, Jadwiga Indulska, Ted McFadden
« Prev « First page 1422 / 1614 Last » Next »