Automatic text processing
C4.5: programs for machine learning
C4.5: programs for machine learning
Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms
Fab: content-based, collaborative recommendation
Communications of the ACM
Learning and Revising User Profiles: The Identification ofInteresting Web Sites
Machine Learning - Special issue on multistrategy learning
Improving automatic query expansion
Proceedings of the 21st annual international ACM SIGIR conference on Research and development in information retrieval
An XML framework for agent-based E-commerce
Communications of the ACM
Communications of the ACM
Intelligent profiling by example
Proceedings of the 6th international conference on Intelligent user interfaces
Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence
Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence
Improving the retrieval effectiveness of very short queries
Information Processing and Management: an International Journal
Web Search Using a Genetic Algorithm
IEEE Internet Computing
The FindMe Approach to Assisted Browsing
IEEE Expert: Intelligent Systems and Their Applications
A Movie Recommendation System—An Application of Voting Theory in User Modeling
User Modeling and User-Adapted Interaction
Hi-index | 0.00 |
This paper presents a solution to the problem of making a trusted third-party authentication protocol fault tolerant. We applied the general solution to the Needham and Schroeder and Kerberos authentication protocols. Finally, we discuss the implementation ...