Sciweavers

1310 search results - page 132 / 262
» Modelling and Using Imperfect Context Information
Sort
View
ACISICIS
2010
IEEE
14 years 11 months ago
Temporal Dynamics in Music Listening Behavior: A Case Study of Online Music Service
Abstract--Although temporal context may significantly affect the popularity of items and user preference over items, traditional information filtering techniques such as recommende...
Chan Ho Park, Minsuk Kahng
MICAI
2007
Springer
15 years 4 months ago
Learning Performance in Evolutionary Behavior Based Mobile Robot Navigation
Abstract. In this paper we utilize information theory to study the impact in learning performance of various motivation and environmental configurations. This study is done within...
Tomás Arredondo Vidal, Wolfgang Freund, C&e...
USS
2008
15 years 9 days ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
CIKM
2009
Springer
15 years 2 months ago
Answering XML queries using materialized views revisited
Answering queries using views is a well-established technique in databases. In this context, two outstanding problems can be formulated. The first one consists in deciding whethe...
Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang
CRYPTO
2009
Springer
105views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Privacy-Enhancing Auctions Using Rational Cryptography
Abstract. We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, ou...
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Tr...