Sciweavers

242 search results - page 34 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
WWW
2008
ACM
15 years 10 months ago
Larger is better: seed selection in link-based anti-spamming algorithms
Seed selection is of significant importance for the biased PageRank algorithms such as TrustRank to combat link spamming. Previous work usually uses a small seed set, which has a ...
Qiancheng Jiang, Lei Zhang, Yizhen Zhu, Yan Zhang
WWW
2007
ACM
15 years 10 months ago
Open user profiles for adaptive news systems: help or harm?
Over the last five years, a range of projects have focused on progressively more elaborated techniques for adaptive news delivery. However, the adaptation process in these systems...
Jae-wook Ahn, Peter Brusilovsky, Jonathan Grady, D...
SIGIR
2012
ACM
12 years 12 months ago
Fighting against web spam: a novel propagation method based on click-through data
Combating Web spam is one of the greatest challenges for Web search engines. State-of-the-art anti-spam techniques focus mainly on detecting varieties of spam strategies, such as ...
Chao Wei, Yiqun Liu, Min Zhang, Shaoping Ma, Liyun...
SAC
2010
ACM
15 years 4 months ago
Content cloaking: preserving privacy with Google Docs and other web applications
Web office suites such as Google Docs offer unparalleled collaboration experiences in terms of low software requirements, ease of use, data ubiquity, and availability. When the d...
Gabriele D'Angelo, Fabio Vitali, Stefano Zacchirol...
DATE
2009
IEEE
113views Hardware» more  DATE 2009»
15 years 4 months ago
MPSoCs run-time monitoring through Networks-on-Chip
—Networks-on-Chip (NoCs) have appeared as design strategy to overcome the limitations, in terms of scalability, efficiency, and power consumption of current buses. In this paper...
Leandro Fiorin, Gianluca Palermo, Cristina Silvano