Sciweavers

1573 search results - page 212 / 315
» Strong User Authentication
Sort
View
ADMA
2008
Springer
122views Data Mining» more  ADMA 2008»
15 years 8 months ago
Open Domain Recommendation: Social Networks and Collaborative Filtering
Commercial enterprises employ data mining techniques to recommend products to their customers. Most of the prior research is usually focused on a specific domain such as movies or...
Sarah K. Tyler, Yi Zhang
EPEW
2007
Springer
15 years 8 months ago
Workload Characterization of the SPECjms2007 Benchmark
Message-oriented middleware (MOM) is at the core of a vast number of financial services and telco applications, and is gaining increasing traction in other industries, such as man...
Kai Sachs, Samuel Kounev, Jean Bacon, Alejandro P....
INFOCOM
2006
IEEE
15 years 7 months ago
On the Long-term Evolution of the Two-Tier Gnutella Overlay
— Peer-to-Peer (P2P) file sharing applications have witnessed a dramatic increase in popularity during the past few years. To accommodate the rapid growth in user population, de...
Amir H. Rasti, Daniel Stutzbach, Reza Rejaie
ER
2005
Springer
130views Database» more  ER 2005»
15 years 7 months ago
Conceptual Model Based Semantic Web Services
To achieve the dream of the semantic web, it must be possible for ordinary users to invoke services. Exactly how to turn this dream into reality is a challenging opportunity and a...
Muhammed Al-Muhammed, David W. Embley, Stephen W. ...
SIGIR
2004
ACM
15 years 7 months ago
Human versus machine in the topic distillation task
This paper reports on and discusses a set of user experiments using the TREC 2003 Web interactive track protocol. The focus is on comparing humans and machine algorithms in terms ...
Mingfang Wu, Gheorghe Muresan, Alistair McLean, Mu...