Sciweavers

422 search results - page 51 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
SAC
2006
ACM
15 years 5 months ago
Bootstrapping multi-party ad-hoc security
Increasingly pervasive computing throws up scenarios where users may wish to achieve some degree of security in their interaction with other people or equipment, in contexts where...
Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming...
SIGCOMM
2005
ACM
15 years 5 months ago
OpenDHT: a public DHT service and its uses
Large-scale distributed systems are hard to deploy, and distributed hash tables (DHTs) are no exception. To lower the barriers facing DHT-based applications, we have created a pub...
Sean C. Rhea, Brighten Godfrey, Brad Karp, John Ku...
SDM
2007
SIAM
187views Data Mining» more  SDM 2007»
15 years 1 months ago
Topic Models over Text Streams: A Study of Batch and Online Unsupervised Learning
Topic modeling techniques have widespread use in text data mining applications. Some applications use batch models, which perform clustering on the document collection in aggregat...
Arindam Banerjee, Sugato Basu
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
16 years 1 months ago
Monitoring Network Evolution using MDL
Given publication titles and authors, what can we say about the evolution of scientific topics and communities over time? Which communities shrunk, which emerged, and which split, ...
Jure Ferlez, Christos Faloutsos, Jure Leskovec, Du...
CIKM
2009
Springer
15 years 6 months ago
A social recommendation framework based on multi-scale continuous conditional random fields
This paper addresses the issue of social recommendation based on collaborative filtering (CF) algorithms. Social recommendation emphasizes utilizing various attributes informatio...
Xin Xin, Irwin King, Hongbo Deng, Michael R. Lyu