Sciweavers

2795 search results - page 460 / 559
» On recommending
Sort
View
91
Voted
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 10 months ago
Differential Attack on Five Rounds of the SC2000 Block Cipher
The SC2000 block cipher has a 128-bit block size and a user key of 128, 192 or 256 bits, which employs a total of 6.5 rounds if a 128bit user key is used. It is a CRYPTREC recommen...
Jiqiang Lu
104
Voted
DOCENG
2009
ACM
14 years 10 months ago
Relating declarative hypermedia objects and imperative objects through the NCL glue language
This paper focuses on the support provided by NCL (Nested Context Language) to relate objects with imperative code content and declarative hypermedia-objects (objects with declara...
Luiz Fernando Gomes Soares, Marcelo Ferreira Moren...
94
Voted
ENTER
2009
Springer
14 years 10 months ago
An Automated Approach for Deriving Semantic Annotations of Tourism Products based on Geospatial Information
High quality product data is a necessary prerequisite for supporting efficient browsing and recommendation procedures on e-commerce platforms. This is especially true for the tour...
Markus Zanker, Matthias Fuchs, Alexander Seebacher...
115
Voted
HCI
2009
14 years 10 months ago
Adaptive Learning via Social Cognitive Theory and Digital Cultural Ecosystems
This paper will look at the human predisposition to oral tradition and its effectiveness as a learning tool to convey mission-critical information. After exploring the effectivenes...
Joseph Juhnke, Adam R. Kallish
111
Voted
ICEBE
2009
IEEE
157views Business» more  ICEBE 2009»
14 years 10 months ago
Trust-Based Access Control for Privacy Protection in Collaborative Environment
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happ...
Min Li, Hua Wang, David Ross