Sciweavers

2795 search results - page 132 / 559
» On recommending
Sort
View
RECSYS
2009
ACM
15 years 5 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
91
Voted
AINA
2007
IEEE
15 years 4 months ago
Fuzzy Recommendation towards QoS-Aware Pervasive Learning
Pervasive learning promises an exciting learning environment such that users can access content and study them at anytime, anywhere, through any devices. Besides delivering the ri...
Zhiwen Yu, Norman Lin, Yuichi Nakamura, Shoji Kaji...
104
Voted
ASPLOS
2008
ACM
15 years 2 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
106
Voted
ENTER
2008
Springer
15 years 2 months ago
Evaluating Recommender Systems in Tourism - A Case Study from Austria
Recommender systems (RS) are employed to personalize user interaction with (e.g. tourism) web-sites, supporting both navigation through large service assortments and the configura...
Markus Zanker, Matthias Fuchs, Wolfram Höpken...
131
Voted
ER
2008
Springer
179views Database» more  ER 2008»
15 years 2 months ago
Recommendation Based Process Modeling Support: Method and User Experience
Abstract Although most workflow management systems nowadays offer graphical editors for process modeling, the learning curve is still too steep for users who are unexperienced in p...
Thomas Hornung, Agnes Koschmider, Georg Lausen