Sciweavers

1054 search results - page 34 / 211
» group 2005
Sort
View
WWW
2005
ACM
15 years 10 months ago
Finding group shilling in recommendation system
In the age of information explosion, recommendation system has been proved effective to cope with information overload in ecommerce area. However, unscrupulous producers shill the...
Xue-Feng Su, Hua-Jun Zeng, Zheng Chen
INFOCOM
2005
IEEE
15 years 3 months ago
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach
— When a sensor network is deployed in hostile environments, the adversary may compromise some sensor nodes, and use the compromised nodes to inject false sensing reports or modi...
Wensheng Zhang, Guohong Cao
CCS
2005
ACM
15 years 3 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
BMCBI
2005
89views more  BMCBI 2005»
14 years 9 months ago
Theme discovery from gene lists for identification and viewing of multiple functional groups
Background: High throughput methods of the genome era produce vast amounts of data in the form of gene lists. These lists are large and difficult to interpret without advanced com...
Petri Pehkonen, Garry Wong, Petri Töröne...
ICDCS
2005
IEEE
15 years 3 months ago
A Dynamic Group Mutual Exclusion Algorithm Using Surrogate-Quorums
The group mutual exclusion problem extends the traditional mutual exclusion problem by associating a type with each critical section. In this problem, processes requesting critica...
Ranganath Atreya, Neeraj Mittal