-
1
-
-
46749146094
-
-
W. Ahmad, A. Khokhar.: cHawk: A Highly Efficient Biclustering AL-gorithm Using Bigraph Crossing Minimization. UIC ECE Tech Report TR-MSL0790. URL: http://www2.uic.edu/~wahmad1/papers/cHawk.pdf
-
W. Ahmad, A. Khokhar.: "cHawk: A Highly Efficient Biclustering AL-gorithm Using Bigraph Crossing Minimization". UIC ECE Tech Report TR-MSL0790. URL: http://www2.uic.edu/~wahmad1/papers/cHawk.pdf
-
-
-
-
2
-
-
0000277371
-
Public-Key Cryptosystems based on Composite Degree Residue Classes
-
P. Paillier, "Public-Key Cryptosystems based on Composite Degree Residue Classes", Advances in Cryptology - EUROCRYPT 99.
-
Advances in Cryptology - EUROCRYPT
, vol.99
-
-
Paillier, P.1
-
3
-
-
46749090817
-
Collaborative Filtering with Privacy via Factor Analysis
-
Tampere Finland, August
-
J. Canny,"Collaborative Filtering with Privacy via Factor Analysis", ACM SIGIR, Tampere Finland, August 2002.
-
(2002)
ACM SIGIR
-
-
Canny, J.1
-
4
-
-
0036082701
-
Collaborative Filtering with Privacy
-
Oakland CA, May
-
J. Canny, "Collaborative Filtering with Privacy", IEEE Conf. on Security and Privacy, Oakland CA, May 2002.
-
(2002)
IEEE Conf. on Security and Privacy
-
-
Canny, J.1
-
6
-
-
3042788736
-
Application of Dimensionality Reduction in Recommender System - A Case Study
-
Sarwar, B. M., Karypis, G., Konstan, J. A., and Riedl, J. "Application of Dimensionality Reduction in Recommender System - A Case Study". ACM WebKDD 2000 Web Mining for E-Commerce Workshop.
-
ACM WebKDD 2000 Web Mining for E-Commerce Workshop
-
-
Sarwar, B.M.1
Karypis, G.2
Konstan, J.A.3
Riedl, J.4
-
7
-
-
1942516801
-
Weighted low rank approximation
-
N. Srebro, T. Jaakkola. "Weighted low rank approximation", In ICML, pages 720-728, 2003.
-
(2003)
In ICML
, pp. 720-728
-
-
Srebro, N.1
Jaakkola, T.2
-
8
-
-
33749567580
-
Emperical analysis of predictive algorithms for collaborative filtering
-
J. S. Breese, D. Heckerman, C. Kadie, "Emperical analysis of predictive algorithms for collaborative filtering", In UAI, pages 43-52, 2004.
-
(2004)
In UAI
, pp. 43-52
-
-
Breese, J.S.1
Heckerman, D.2
Kadie, C.3
-
10
-
-
85030174634
-
GroupLens: An open architecture for collaborative filtering of netnews
-
Resnick, P., Iacovou, N., Sushak, M., Bergstrom, P., and Riedl, J. GroupLens: An open architecture for collaborative filtering of netnews. Proceedings of the 1994 Computer Supported Collaborative Work Conference.
-
Proceedings of the 1994 Computer Supported Collaborative Work Conference
-
-
Resnick, P.1
Iacovou, N.2
Sushak, M.3
Bergstrom, P.4
Riedl, J.5
-
11
-
-
0031272327
-
Efficient approximations to for the marginal likelihood of bayesian Networks with hidden variables
-
D. Chickering, D.Heckerman, "Efficient approximations to for the marginal likelihood of bayesian Networks with hidden variables", Machine Learning, 29:180-212.
-
Machine Learning
, vol.29
, pp. 180-212
-
-
Chickering, D.1
Heckerman, D.2
-
12
-
-
26244461684
-
Clustering with Bregman Divergences
-
October
-
A. Banerjee, S. Merugu, I. S. Dhillon, and J. Ghosh, "Clustering with Bregman Divergences". Journal of Machine Learning Research, vol. 6, pages 1705-1749, October 2005.
-
(2005)
Journal of Machine Learning Research
, vol.6
, pp. 1705-1749
-
-
Banerjee, A.1
Merugu, S.2
Dhillon, I.S.3
Ghosh, J.4
-
13
-
-
1642301688
-
-
L. F. Cranor, I Didn't Buy it for Myself, Privacy and E-Commerce Penalization, WPES 2003, Washington, DC, USA, pages 111-117.
-
L. F. Cranor, "I Didn't Buy it for Myself, Privacy and E-Commerce Penalization", WPES 2003, Washington, DC, USA, pages 111-117.
-
-
-
-
14
-
-
46749138651
-
The Culnan-Milne Survey on Consumer and Online Privacy Notices: Summary of Responses
-
M. J. Cuban and G. R. Milne. "The Culnan-Milne Survey on Consumer and Online Privacy Notices: Summary of Responses", http://www.ftc.gov/bcp/ workshops/glb/supporting/culniui-milney.pdf.
-
-
-
Cuban, M.J.1
Milne, G.R.2
-
15
-
-
46749149208
-
-
Cyber Dialogue. 2001. Cyber Dialogue Survey Data Reveals Lost Revenue for Retailers Due to Widespread Consumer Privacy Concerns, (New York, Cyber Dialogue, November, 7 , 2001), http://www.cyberdialogue.com/news/ releases/2001/11-07-uco-retail.html
-
Cyber Dialogue. 2001. "Cyber Dialogue Survey Data Reveals Lost Revenue for Retailers Due to Widespread Consumer Privacy Concerns", (New York, Cyber Dialogue, November, 7 , 2001), http://www.cyberdialogue.com/news/ releases/2001/11-07-uco-retail.html
-
-
-
-
16
-
-
46749104446
-
On the Privacy Preserving Properties of Random data Perturbation Techniques
-
H. Kargupta, S. Datta, Q. wang and K. Sivakmar. "On the Privacy Preserving Properties of Random data Perturbation Techniques", IEEE ICDM, pages 625-628, 2003.
-
(2003)
IEEE ICDM
, pp. 625-628
-
-
Kargupta, H.1
Datta, S.2
wang, Q.3
Sivakmar, K.4
-
18
-
-
46749117540
-
-
M. Malkin, T. Wu, and D. Boneh. Experimenting with Shared Generation of RSA keys,In proceedings of the Internet Society's 1999 Symposium on Network and Distributed System Security (NDSS), pp. 43-56.
-
M. Malkin, T. Wu, and D. Boneh. "Experimenting with Shared Generation of RSA keys",In proceedings of the Internet Society's 1999 Symposium on Network and Distributed System Security (NDSS), pp. 43-56.
-
-
-
-
19
-
-
29844458622
-
Deriving Private Information from Random Data
-
Z. Huang, W. Du and B. Chen. "Deriving Private Information from Random Data", ACM SIGMOD, pages 37-48, 2005.
-
(2005)
ACM SIGMOD
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
20
-
-
46749122242
-
Privacy Preserving Collaborative Filtering using randomized perturbation techniques
-
H. Polat and W. Du. "Privacy Preserving Collaborative Filtering using randomized perturbation techniques", IEEE ICDM, pages 625-628, 2003.
-
(2003)
IEEE ICDM
, pp. 625-628
-
-
Polat, H.1
Du, W.2
-
21
-
-
33644514610
-
SVD-based Collaborative Filtering with Privacy
-
H. Polat and W. Du. "SVD-based Collaborative Filtering with Privacy", ACM SAC, pages 791-795, 2005.
-
(2005)
ACM SAC
, pp. 791-795
-
-
Polat, H.1
Du, W.2
|