Sciweavers

830 search results - page 76 / 166
» Responsiveness without interrupts
Sort
View
131
Voted
SIGIR
2011
ACM
14 years 3 months ago
Functional matrix factorizations for cold-start recommendation
A key challenge in recommender system research is how to effectively profile new users, a problem generally known as cold-start recommendation. Recently the idea of progressivel...
Ke Zhou, Shuang-Hong Yang, Hongyuan Zha
118
Voted
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 16 days ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
105
Voted
RFIDSEC
2010
14 years 11 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...
INFOCOM
2006
IEEE
15 years 6 months ago
Tunnel Vector: A New Routing Algorithm with Scalability
—Routing algorithms such as Distance Vector and Link States have the routing table size as ΩΩΩΩ (n), where n is the number of destination identifiers, thus providing only...
Cheng-Jia Lai, Richard R. Muntz
89
Voted
VLDB
1997
ACM
104views Database» more  VLDB 1997»
15 years 4 months ago
Multiple-View Self-Maintenance in Data Warehousing Environments
A data warehouse materializes views derived from data that may not reside at the warehouse. Maintaining these views e ciently in response to base updates is di cult, since it may ...
Nam Huyn