-
1
-
-
42149131542
-
Enhancing privacy and preserving accuracy of a distributed collaborative filtering
-
S. Berkovsky, Y. Eytani, T. Kuflik, and F. Ricci. Enhancing privacy and preserving accuracy of a distributed collaborative filtering. In the Proceedings of the 2007 ACM conference on Recommender systems, pages 9-16, 2007.
-
(2007)
the Proceedings of the 2007 ACM conference on Recommender systems
, pp. 9-16
-
-
Berkovsky, S.1
Eytani, Y.2
Kuflik, T.3
Ricci, F.4
-
4
-
-
84874800178
-
-
T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31, No.4, 1985, pp469472, 1985.
-
T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, Vol. IT-31, No.4, 1985, pp469472, 1985.
-
-
-
-
5
-
-
51349130052
-
Preserving privacy in joining recommender systems
-
C. Hsieh, J. Zhan, D. Zeng, and F. Wang. Preserving privacy in joining recommender systems. In International Conference on Information Security and Assurance (ISA 2008), pages 561-566, 2008.
-
(2008)
International Conference on Information Security and Assurance (ISA 2008)
, pp. 561-566
-
-
Hsieh, C.1
Zhan, J.2
Zeng, D.3
Wang, F.4
-
6
-
-
37049012047
-
Does a one-size recommendation system fit all? the effectiveness of collaborative filtering based recommendation systems across different domains and search modes
-
I. Im and A. Hars. Does a one-size recommendation system fit all? the effectiveness of collaborative filtering based recommendation systems across different domains and search modes. ACM Transaction of Information Systems, 26(1):4, 2007.
-
(2007)
ACM Transaction of Information Systems
, vol.26
, Issue.1
, pp. 4
-
-
Im, I.1
Hars, A.2
-
9
-
-
0031104254
-
Recommender systems
-
P. Resnick and H. Varian. Recommender systems. Commun. ACM, 40(3):56-58, 1997.
-
(1997)
Commun. ACM
, vol.40
, Issue.3
, pp. 56-58
-
-
Resnick, P.1
Varian, H.2
-
11
-
-
38049046146
-
Information theoretically secure number product protocol
-
August 19-22, HongKong
-
C. Shen, J. Zhan, D. Wang, T. Hsu, and C. Liau. Information theoretically secure number product protocol. In International Conference on Machine Learning and Cybernetics, August 19-22, HongKong, 2007, 2007.
-
(2007)
International Conference on Machine Learning and Cybernetics
-
-
Shen, C.1
Zhan, J.2
Wang, D.3
Hsu, T.4
Liau, C.5
-
12
-
-
57949108519
-
Towards empirical aspects of secure scalar product. IEEE Transaction of Systems, Man, and Cybernetics, Part C
-
to appear
-
I. Wang, C. Shen, J. Zhan, T. Hsu, C. Liau, and D. Wang. Towards empirical aspects of secure scalar product. IEEE Transaction of Systems, Man, and Cybernetics, Part C, to appear, 2008.
-
(2008)
-
-
Wang, I.1
Shen, C.2
Zhan, J.3
Hsu, T.4
Liau, C.5
Wang, D.6
|