Sciweavers

422 search results - page 40 / 85
» Risk management for distributed authorization
Sort
View
SOSP
2005
ACM
15 years 9 months ago
Hibernator: helping disk arrays sleep through the winter
Energy consumption has become an important issue in high-end data centers, and disk arrays are one of the largest energy consumers within them. Although several attempts have been...
Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, ...
96
Voted
CCS
2007
ACM
15 years 6 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
CSCW
2006
ACM
15 years 19 days ago
Scientific Data Collections and Distributed Collective Practice
As the basic sciences become increasingly information-intensive, the management and use of research data presents new challenges in the collective activities that constitute schola...
Melissa H. Cragin, Kalpana Shankar
118
Voted
CIKM
2006
Springer
15 years 4 months ago
Incorporating query difference for learning retrieval functions in world wide web search
We discuss information retrieval methods that aim at serving a diverse stream of user queries such as those submitted to commercial search engines. We propose methods that emphasi...
Hongyuan Zha, Zhaohui Zheng, Haoying Fu, Gordon Su...
116
Voted
SIGIR
2002
ACM
15 years 7 days ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny