Sciweavers

1065 search results - page 108 / 213
» The Design of PIRS, a Peer-to-Peer Information Retrieval Sys...
Sort
View
RECSYS
2009
ACM
15 years 2 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
SAC
2008
ACM
14 years 9 months ago
Web service access management for integration with agent systems
The agent paradigm includes the notion that agents interact with services. This paper identifies the need for controlled access to such services, from the perspective of agent sys...
Benno J. Overeinder, P. D. Verkaik, Frances M. T. ...
DL
1999
Springer
122views Digital Library» more  DL 1999»
15 years 2 months ago
Multimodal Surrogates for Video Browsing
Three types of video surrogates visual (keyframes), verbal (keywords/phrases), and visual and verbal were designed and studied in a qualitative investigation of user cognitive pro...
Wei Ding, Gary Marchionini, Dagobert Soergel
ENTER
2009
Springer
15 years 4 months ago
Personalized Mobile City Transport Advisory System
Mobile devices are becoming an inseparable part of our lives and personalized location-based mobile services are gaining more and more popularity. The scope of this paper is to il...
Gytis Tumas, Francesco Ricci
MM
2003
ACM
262views Multimedia» more  MM 2003»
15 years 3 months ago
ARMS: adaptive rich media secure streaming
In this demonstration we present the ARMS system which enables secure and adaptive rich media streaming to a large-scale, heterogeneous client population. The ARMS system dynamica...
Lisa Amini, Raymond Rose, Chitra Venkatramani, Oli...