Sciweavers

210 search results - page 35 / 42
» Learning and managing user context in personalized communica...
Sort
View
IPAW
2010
14 years 8 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau
ICAC
2008
IEEE
15 years 4 months ago
Utility-Based Reinforcement Learning for Reactive Grids
—Large scale production grids are an important case for autonomic computing. They follow a mutualization paradigm: decision-making (human or automatic) is distributed and largely...
Julien Perez, Cécile Germain-Renaud, Bal&aa...
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
15 years 10 months ago
Web usage mining based on probabilistic latent semantic analysis
The primary goal of Web usage mining is the discovery of patterns in the navigational behavior of Web users. Standard approaches, such as clustering of user sessions and discoveri...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
AICCSA
2007
IEEE
209views Hardware» more  AICCSA 2007»
15 years 2 months ago
LBS and GIS Technology Combination and Applications
Location Based Services (LBSs) provide personalized services to the subscribers based on their current position using Global Navigation Satellite System (GNSS), Geographic Informa...
Balqies Sadoun, Omar Al-Bayari
CCS
2008
ACM
15 years 2 days ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...