-
1
-
-
53449102514
-
Alambic: A privacy-preserving recommender system for electronic commerce
-
Aïmeur, E., Brassard, G., Fernandez, J.M. and Mani Onana, F.S. Alambic: a privacy-preserving recommender system for electronic commerce. International Journal of Information Security. 7, 5 (2008), 307-334.
-
(2008)
International Journal of Information Security.
, vol.7
, Issue.5
, pp. 307-334
-
-
Aïmeur, E.1
Brassard, G.2
Fernandez, J.M.3
Mani Onana, F.S.4
-
5
-
-
0141607824
-
Latent dirichlet allocation
-
Blei, D.M., Ng, A.Y. and Jordan, M.I. Latent dirichlet allocation. Journal of Machine Learning research. 3, (2003), 993-1022.
-
(2003)
Journal of Machine Learning Research.
, vol.3
, pp. 993-1022
-
-
Blei, D.M.1
Ng, A.Y.2
Jordan, M.I.3
-
6
-
-
0002051628
-
Empirical analysis of predictive algorithms for collaborative filtering
-
San Francisco, CA, USA
-
Breese, J.S., Heckerman, D. and Kadie, C. Empirical analysis of predictive algorithms for collaborative filtering. Proceedings of the 14th conference on Uncertainty in Artificial Intelligence (San Francisco, CA, USA, 1998), 43-52.
-
(1998)
Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence
, pp. 43-52
-
-
Breese, J.S.1
Heckerman, D.2
Kadie, C.3
-
9
-
-
77953984854
-
Short and tweet: Experiments on recommending content from information streams
-
Chen, J., Nairn, R., Nelson, L., Bernstein, M. and Chi, E. 2010. Short and tweet: experiments on recommending content from information streams. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2010), 1185-1194.
-
(2010)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2010
, pp. 1185-1194
-
-
Chen, J.1
Nairn, R.2
Nelson, L.3
Bernstein, M.4
Chi, E.5
-
10
-
-
84866619572
-
Collaborative personalized tweet recommendation
-
Chen, K., Chen, T., Zheng, G., Jin, O., Yao, E. and Yu, Y. Collaborative personalized tweet recommendation. Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval (2012), 661-670.
-
(2012)
Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval
, pp. 661-670
-
-
Chen, K.1
Chen, T.2
Zheng, G.3
Jin, O.4
Yao, E.5
Yu, Y.6
-
12
-
-
84878370000
-
Hummingbird: Privacy at the time of Twitter
-
May
-
De Cristofaro, E., Soriente, C., Tsudik, G. and Williams, A. Hummingbird: privacy at the time of Twitter. Proceedings of 2012 IEEE Symposium on Security and Privacy (SP) (May 2012), 285-299.
-
(2012)
Proceedings of 2012 IEEE Symposium on Security and Privacy (SP)
, pp. 285-299
-
-
De Cristofaro, E.1
Soriente, C.2
Tsudik, G.3
Williams, A.4
-
13
-
-
84867345632
-
Real-time top-n recommendation in social streams
-
Diaz-Aviles, E., Drumond, L., Schmidt-Thieme, L. and Nejdl, W. Real-time top-n recommendation in social streams. Proceedings of the 6th ACM Conference on Recommender Systems (2012), 59-66.
-
(2012)
Proceedings of the 6th ACM Conference on Recommender Systems
, pp. 59-66
-
-
Diaz-Aviles, E.1
Drumond, L.2
Schmidt-Thieme, L.3
Nejdl, W.4
-
14
-
-
80053229463
-
An empirical study on learning to rank of tweets
-
Duan, Y., Jiang, L., Qin, T., Zhou, M. and Shum, H.-Y. An empirical study on learning to rank of tweets. Proceedings of the 23rd International Conference on Computational Linguistics (2010), 295-303.
-
(2010)
Proceedings of the 23rd International Conference on Computational Linguistics
, pp. 295-303
-
-
Duan, Y.1
Jiang, L.2
Qin, T.3
Zhou, M.4
Shum, H.-Y.5
-
15
-
-
84990231617
-
Social networking with Frientegrity: Privacy and integrity with an untrusted provider
-
Berkeley, CA, USA
-
Feldman, A.J., Blankstein, A., Freedman, M.J. and Felten, E.W. Social networking with Frientegrity: privacy and integrity with an untrusted provider. Proceedings of the 21st USENIX Conference on Security Symposium (Berkeley, CA, USA, 2012), 31-31.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium
, pp. 31
-
-
Feldman, A.J.1
Blankstein, A.2
Freedman, M.J.3
Felten, E.W.4
-
18
-
-
84866633842
-
Learning to rank social update streams
-
Hong, L., Bekkerman, R., Adler, J. and Davison, B.D. Learning to rank social update streams. Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval (2012), 651-660.
-
(2012)
Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval
, pp. 651-660
-
-
Hong, L.1
Bekkerman, R.2
Adler, J.3
Davison, B.D.4
-
20
-
-
85008044987
-
Matrix factorization techniques for recommender systems
-
Koren, Y., Bell, R. and Volinsky, C. Matrix factorization techniques for recommender systems. Computer. 42, 8 (2009), 30-37.
-
(2009)
Computer.
, vol.42
, Issue.8
, pp. 30-37
-
-
Koren, Y.1
Bell, R.2
Volinsky, C.3
-
24
-
-
84919085619
-
An improved algorithm for computing logarithms over GF (p) and its cryptographic significance
-
Pohlig, S. and Hellman, M. An improved algorithm for computing logarithms over GF (p) and its cryptographic significance. Information Theory, IEEE Transactions on. 24, 1 (1978), 106-110.
-
(1978)
Information Theory, IEEE Transactions On.
, vol.24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
25
-
-
33745783127
-
Achieving private recommendations using randomized response techniques
-
Polat, H. and Du, W. Achieving private recommendations using randomized response techniques. Advances in Knowledge Discovery and Data Mining. (2006), 637-646.
-
(2006)
Advances in Knowledge Discovery and Data Mining.
, pp. 637-646
-
-
Polat, H.1
Du, W.2
-
27
-
-
46749122242
-
Privacy-preserving collaborative filtering using randomized perturbation techniques
-
Washington, DC, USA
-
Polat, H. and Du, W. Privacy-preserving collaborative filtering using randomized perturbation techniques. Proceedings of the 3rd IEEE International Conference on Data Mining (Washington, DC, USA, 2003), 625-628.
-
(2003)
Proceedings of the 3rd IEEE International Conference on Data Mining
, pp. 625-628
-
-
Polat, H.1
Du, W.2
-
28
-
-
33644514610
-
SVD-based collaborative filtering with privacy
-
New York, NY, USA
-
Polat, H. and Du, W. SVD-based collaborative filtering with privacy. Proceedings of the 2005 ACM symposium on Applied Computing (New York, NY, USA, 2005), 791-795.
-
(2005)
Proceedings of the 2005 ACM Symposium on Applied Computing
, pp. 791-795
-
-
Polat, H.1
Du, W.2
-
30
-
-
84897889797
-
Anonymity, privacy, and security online
-
20130905
-
Rainie, L., Kiesler, S., Kang, R. and Madden, M. 20130905. Anonymity, privacy, and security online. Pew Internet & American Life Project. http://www.pewinternet.org/PPF/r/213/report-display.asp
-
Pew Internet & American Life Project.
-
-
Rainie, L.1
Kiesler, S.2
Kang, R.3
Madden, M.4
-
34
-
-
84878726112
-
Twitsper: Tweeting privately
-
Singh, I., Butkiewicz, M., Madhyastha, H.V., Krishnamurthy, S.V. and Addepalli, S. Twitsper: tweeting privately. IEEE Security Privacy. 11, 3 (2013), 46-50.
-
(2013)
IEEE Security Privacy.
, vol.11
, Issue.3
, pp. 46-50
-
-
Singh, I.1
Butkiewicz, M.2
Madhyastha, H.V.3
Krishnamurthy, S.V.4
Addepalli, S.5
-
35
-
-
80052396145
-
Like like alike: Joint friendship and interest propagation in social networks
-
Yang, S.-H., Long, B., Smola, A., Sadagopan, N., Zheng, Z. and Zha, H. Like like alike: joint friendship and interest propagation in social networks. Proceedings of the 20th International Conference on World Wide Web (2011), 537-546.
-
(2011)
Proceedings of the 20th International Conference on World Wide Web
, pp. 537-546
-
-
Yang, S.-H.1
Long, B.2
Smola, A.3
Sadagopan, N.4
Zheng, Z.5
Zha, H.6
-
37
-
-
84984889706
-
-
SVDFeature toolkit. http://svdfeature.apexlab.org/wiki/Main-Page
-
SVDFeature Toolkit
-
-
-
38
-
-
84892700483
-
-
Twitter statistics. http://www.statisticbrain.com/twitter-statistics/
-
Twitter Statistics
-
-
|