Sciweavers

507 search results - page 86 / 102
» Trust-based collaborative filtering
Sort
View
UIST
2009
ACM
15 years 4 months ago
CommunityCommands: command recommendations for software applications
We explore the use of modern recommender system technology to address the problem of learning software applications. Before describing our new command recommender system, we first...
Justin Matejka, Wei Li, Tovi Grossman, George W. F...
SECON
2008
IEEE
15 years 4 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang
ICNS
2007
IEEE
15 years 4 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
UM
2007
Springer
15 years 4 months ago
Feature-Weighted User Model for Recommender Systems
Recommender systems are gaining widespread acceptance in e-commerce applications to confront the “information overload” problem. Collaborative Filtering (CF) is a successful re...
Panagiotis Symeonidis, Alexandros Nanopoulos, Yann...
ETFA
2006
IEEE
15 years 3 months ago
Wake on LAN over Internet as Web Service
In this paper we present an approach based on the use of embedded network devices for the deployment of small network services, such as DHCP, BOOTP, filters or very specific proxi...
Juan Antonio Gil-Martínez-Abarca, Francisco...