Sciweavers

239 search results - page 44 / 48
» Role-based results redistribution for collaborative informat...
Sort
View
178
Voted
GIS
2009
ACM
15 years 10 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
VW
2009
Springer
153views Virtual Reality» more  VW 2009»
15 years 4 months ago
A Content Management System for User-Driven Museums in Second life
—Over two decades, a great expectation on digital museums has been addressed but most of them have been implemented based on web technologies. Emerging Second Life, which support...
Kingkarn Sookhanaphibarn, Ruck Thawonmas
RECSYS
2009
ACM
15 years 4 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...
72
Voted
ACL
2000
14 years 11 months ago
PENS: A Machine-aided English Writing System for Chinese Users
Writing English is a big barrier for most Chinese users. To build a computer-aided system that helps Chinese users not only on spelling checking and grammar checking but also on w...
Ting Liu, Ming Zhou, Jianfeng Gao, Endong Xun, Cha...
CORR
2007
Springer
105views Education» more  CORR 2007»
14 years 9 months ago
Empirical Evaluation of Four Tensor Decomposition Algorithms
Higher-order tensor decompositions are analogous to the familiar Singular Value Decomposition (SVD), but they transcend the limitations of matrices (second-order tensors). SVD is ...
Peter D. Turney