Sciweavers

3259 search results - page 512 / 652
» Modeling Autonomous-System Relationships
Sort
View
119
Voted
WWW
2006
ACM
16 years 4 months ago
Mining clickthrough data for collaborative web search
This paper is to investigate the group behavior patterns of search activities based on Web search history data, i.e., clickthrough data, to boost search performance. We propose a ...
Jian-Tao Sun, Xuanhui Wang, Dou Shen, Hua-Jun Zeng...
PKC
2009
Springer
180views Cryptology» more  PKC 2009»
16 years 4 months ago
Security of Sanitizable Signatures Revisited
Sanitizable signature schemes, as defined by Ateniese et al. (ESORICS 2005), allow a signer to partly delegate signing rights to another party, called the sanitizer. That is, the s...
Anja Lehmann, Christina Brzuska, Dominique Schr&ou...
116
Voted
KDD
2008
ACM
110views Data Mining» more  KDD 2008»
16 years 3 months ago
Mining preferences from superior and inferior examples
Mining user preferences plays a critical role in many important applications such as customer relationship management (CRM), product and service recommendation, and marketing camp...
Bin Jiang, Jian Pei, Xuemin Lin, David W. Cheung, ...
166
Voted
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
16 years 3 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta
95
Voted
EDBT
2006
ACM
118views Database» more  EDBT 2006»
16 years 3 months ago
On Honesty in Sovereign Information Sharing
Abstract. We study the following problem in a sovereign informationsharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave hone...
Rakesh Agrawal, Evimaria Terzi