Sciweavers

367 search results - page 30 / 74
» Novelty and Collective Attention
Sort
View
CRYPTO
2004
Springer
97views Cryptology» more  CRYPTO 2004»
15 years 5 months ago
Efficient Tree-Based Revocation in Groups of Low-State Devices
Abstract. We study the problem of broadcasting confidential information to a collection of n devices while providing the ability to revoke an arbitrary subset of those devices (and...
Michael T. Goodrich, Jonathan Z. Sun, Roberto Tama...
ETRICS
2006
15 years 5 months ago
Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems
Recommender systems are widely used to help deal with the problem of information overload. However, recommenders raise serious privacy and security issues. The personal information...
Shyong K. Lam, Dan Frankowski, John Riedl
WSC
2007
15 years 3 months ago
Empirical investigations of conceptual modeling and the modeling process
Conceptual modeling, deciding what to include in the model, is a very important task in the modeling process. However, it has so far received relatively little attention in the li...
Wang Wang, Roger J. Brooks
DBSEC
2010
319views Database» more  DBSEC 2010»
15 years 2 months ago
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach
As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, i...
Alex Hai Wang
DELOS
2007
15 years 2 months ago
MESSIF: Metric Similarity Search Implementation Framework
The similarity search has become a fundamental computational task in many applications. One of the mathematical models of the similarity – the metric space – has drawn attenti...
Michal Batko, David Novak, Pavel Zezula