A Secure Online Algorithm for Link Analysis on Weighted Graph
暂无分享,去创建一个
[1] Elijah Polak,et al. Computational methods in optimization , 1971 .
[2] Allen and Rosenbloom Paul S. Newell,et al. Mechanisms of Skill Acquisition and the Law of Practice , 1993 .
[3] Gerard Salton,et al. Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer , 1989 .
[4] V. N. Bogaevski,et al. Matrix Perturbation Theory , 1991 .
[5] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[6] Audra E. Kosh,et al. Linear Algebra and its Applications , 1992 .
[7] Michael F. Schwartz,et al. Discovering shared interests using graph analysis , 1993, CACM.
[8] Bart Selman,et al. Agent Amplified Communication , 1996, AAAI/IAAI, Vol. 1.
[9] Ramana Rao,et al. Silk from a sow's ear: extracting usable structures from the Web , 1996, CHI.
[10] Mark S. Ackerman,et al. Answer Garden 2: merging organizational memory with collaborative help , 1996, CSCW '96.
[11] Henry Kautz,et al. Combining social networks and collaborative ?ltering , 1997 .
[12] Rick Kazman,et al. WebQuery: Searching and Visualizing the Web Through Connectivity , 1997, Comput. Networks.
[13] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[14] Mark S. Ackerman,et al. Just talk to me: a field study of expertise location , 1998, CSCW '98.
[15] Jon M. Kleinberg,et al. Automatic Resource Compilation by Analyzing Hyperlink Structure and Associated Text , 1998, Comput. Networks.
[16] M. KleinbergJon. Authoritative sources in a hyperlinked environment , 1999 .
[17] Jacques Stern,et al. One Round Threshold Discrete-Log Key Generation without Private Channels , 2001, Public Key Cryptography.
[18] Michael I. Jordan,et al. Stable algorithms for link analysis , 2001, SIGIR '01.
[19] Michael I. Jordan,et al. Link Analysis, Eigenvectors and Stability , 2001, IJCAI.
[20] John F. Canny,et al. Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[21] John F. Canny,et al. Practical Large-Scale Distributed Key Generation , 2004, EUROCRYPT.