Başlık için Makale Koleksiyonu listeleme
Toplam kayıt 100, listelenen: 77-96
-
QoS guarantee for multimedia traffic in smart homes
(Springer, 2010)With the advent of home networking and widespread deployment of broadband connectivity to homes, a wealth of new services with real-time Quality of Service (QoS) requirements have emerged, e.g., Video on Demand (VoD), IP ... -
Reconstructing rated items from perturbed data
(Elsevier Science BV, 2016)The basic idea behind privacy-preserving collaborative filtering schemes is to prevent data collectors from deriving the actual rating values and the rated items. Different data perturbation methods have been proposed to ... -
Robustness analysis of arbitrarily distributed data-based recommendation methods
(Pergamon-Elsevier Science LTD, 2016)Due to different shopping routines of people, rating preferences of many customers might be partitioned between two parties. Since two different e-companies might sell products from the same range to the identical set of ... -
Robustness analysis of multi-criteria collaborative filtering algorithms against shilling attacks
(Pergamon-Elsevier Science LTD, 2019)Collaborative filtering is an emerging recommender system technique that aims guiding users based on other customers preferences with behavioral similarities. Such correspondences are located based on preference history ... -
Robustness analysis of naïve Bayesian classifier-based collaborative filtering
(Springer Verlag, 2013)In this study, binary forms of previously defined basic shilling attack models are proposed and the robustness of naïve Bayesian classifierbased collaborative filtering algorithm is examined. Real data-based experiments ... -
Robustness analysis of privacy-preserving model-based recommendation schemes
(Pergamon-Elsevier Science LTD, 2014)Privacy-preserving model-based recommendation methods are preferable over privacy-preserving memory-based schemes due to their online efficiency. Model-based prediction algorithms without privacy concerns have been ... -
A scalable privacy-preserving recommendation scheme via bisecting k-means clustering
(Elsevier Sci LTD, 2013)Privacy-preserving collaborative filtering is an emerging web-adaptation tool to cope with information overload problem without jeopardizing individuals' privacy. However, collaborative filtering with privacy schemes ... -
The search for optimal feature set in power quality event classification
(Pergamon-Elsevier Science LTD, 2009)The significance of detection and classification of power quality (PQ) events that disturbs the voltage and/or current waveforms in the electrical power distribution networks is well known. Consequently, in spite of a large ... -
Secure seamless peer-to-peer (P2P) UDP communication using IPv4 LSRR option and IPv4+4 addresses
(Pergamon-Elsevier Science LTD, 2009)The current structure of the Internet, with hosts behind network address translation (NAT) boxes, Causes well-known problems for P2P applications. There are several proposals, e.g., STUN, UPnP, MIDCOM, TURN among others, ... -
Sentiment Classification based on Domain Prediction
(Kaunas University Technology, 2016)Sentiment classification has received increasing attention in recent years. Supervised learning methods for sentiment classification require considerable amount of labeled data for training purposes. As the number of domains ... -
Shilling Attacks Against Memory-Based Privacy-Preserving Recommendation Algorithms
(Ksii-Kor Soc Internet Information, 2013)Privacy-preserving collaborative filtering schemes are becoming increasingly popular because they handle the information overload problem without jeopardizing privacy. However, they may be susceptible to shilling or profile ... -
Shilling attacks against recommender systems: a comprehensive survey
(Springer, 2014)Online vendors employ collaborative filtering algorithms to provide recommendations to their customers so that they can increase their sales and profits. Although recommendation schemes are successful in e-commerce sites, ... -
A Signal-Specific QMF Bank Design Technique Using Karhunen-Loeve Transform Approximation
(Hindawi Publishing Corporation, 2011)Block Wavelet Transforms (BWTs) are orthogonal matrix transforms that can be obtained from orthogonal subband filter banks. They were initially generated to produce matrix transforms which may carry nice properties inheriting ... -
Solo Test Oyunu Üzerinde Kuyruk Listesi İle Bir Paralel Önce-Derine Arama Algoritması
(2014)Solo Test oyununda tablada tek taşın kaldığı duruma ulaşmak için takip edilmesi gereken hamleler, DFS algoritmasıyla günümüz bilgisayarlarında kısa sürede bulunabilmektedir. Bu sürenin kısaltılması amacıyla bu makalede ... -
SOM-based recommendations with privacy on multi-party vertically distributed data
(Palgrave Macmillan LTD, 2012)Data collected for providing recommendations can be partitioned among different parties. Offering distributed data-based predictions is popular due to mutual advantages. It is almost impossible to present trustworthy ... -
Subspace based feature selection for pattern recognition
(Elsevier Science Inc, 2008)Feature selection is an essential topic in the field of pattern recognition. The feature selection strategy has a direct influence on the accuracy and processing time of pattern recognition applications. Features can be ... -
A Survey of Privacy-Preserving Collaborative Filtering Schemes
(World Scientific Publ Co Pte LTD, 2013)With increasing need for preserving confidential data while providing recommendations, privacy-preserving collaborative filtering has been receiving increasing attention. To make data owners feel more comfortable while ... -
A survey on ECG analysis
(Elsevier Sci LTD, 2018)The electrocardiogram (ECG) signal basically corresponds to the electrical activity of the heart. In the literature, the ECG signal has been analyzed and utilized for various purposes, such as measuring the heart rate, ... -
A survey: deriving private information from perturbed data
(Springer, 2015)Privacy-preserving data mining has attracted the attention of a large number of researchers. Many data perturbation methods have been proposed to ensure individual privacy. Such methods seem to be successful in providing ... -
SWCD: a sliding window and self-regulated learning-based background updating method for change detection in videos
(Is&T & Spie, 2018)Change detection with background subtraction process remains to be an unresolved issue and attracts research interest due to challenges encountered on static and dynamic scenes. The key challenge is about how to update ...