Sciweavers

2995 search results - page 400 / 599
» On multi-avoidance of generalized patterns
Sort
View
138
Voted
WIDM
2005
ACM
15 years 9 months ago
Preventing shilling attacks in online recommender systems
Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalize...
Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Z...
139
Voted
WPES
2005
ACM
15 years 9 months ago
Information revelation and privacy in online social networks
Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create on...
Ralph Gross, Alessandro Acquisti, H. John Heinz II...
142
Voted
ADHOCNOW
2005
Springer
15 years 9 months ago
Reed-Solomon and Hermitian Code-Based Scheduling Protocols for Wireless Ad Hoc Networks
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Carlos H. Rentel, Thomas Kunz
136
Voted
AISADM
2005
Springer
15 years 9 months ago
Querying Dynamic and Context-Sensitive Metadata in Semantic Web
RDF (core Semantic Web standard) is not originally appropriate for context representation, because of its initial focus on the ordinary Web resources, such as web pages, files, dat...
Sergiy Nikitin, Vagan Y. Terziyan, Yaroslav Tsaruk...
128
Voted
CIARP
2005
Springer
15 years 9 months ago
Dynamic Hierarchical Compact Clustering Algorithm
Abstract. In this paper we introduce a general framework for hierarchical clustering that deals with both static and dynamic data sets. From this framework, different hierarchical...
Reynaldo Gil-García, José Manuel Bad...