CARS-AD: a context-aware recommender system to decide about implicit or explicit authentication in ubihealth
暂无分享,去创建一个
Mario A. R. Dantas | Iara Augustin | Cristiano C. da Rocha | João Carlos D. Lima | Matheus A. Vieira
[1] Carlos Delgado Kloos,et al. A Collaborative Recommender System Based on Space-Time Similarities , 2010, IEEE Pervasive Computing.
[2] Francesco Ricci,et al. Acquiring and Revising Preferences in a Critique-Based Mobile Recommender System , 2007, IEEE Intelligent Systems.
[3] Kenta Oku,et al. A Recommendation System Considering Users' Past / Current / Future Contexts , 2010 .
[4] Francesco Ricci,et al. Mobile Recommender Systems , 2010, J. Inf. Technol. Tour..
[5] David W. McDonald,et al. Ubiquitous Recommendation Systems , 2003, Computer.
[6] Anders Kofod-Petersen,et al. Using Activity Theory to Model Context Awareness: A Qualitative Case Study , 2006, FLAIRS.
[7] Gleneesha M. Johnson. Towards shrink-wrapped security: A taxonomy of security-relevant context , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[8] Robin D. Burke,et al. Hybrid Web Recommender Systems , 2007, The Adaptive Web.
[9] Tsan-sheng Hsu,et al. Privacy-Preserving Collaborative Recommender Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[10] Michael Anthony Bauer,et al. A Context-Aware Authentication Approach Based on Behavioral Definitions , 2010, IKE.
[11] Iara Augustin,et al. ISAMadapt: abstractions and tools for designing general‐purpose pervasive applications , 2006, Softw. Pract. Exp..
[12] M. A. R. Dantas,et al. An authentication approach based on behavioral profiles , 2010, 5th Iberian Conference on Information Systems and Technologies.
[13] Gerard Salton,et al. Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer , 1989 .
[14] Lorna Uden,et al. Activity theory for designing mobile learning , 2007, Int. J. Mob. Learn. Organisation.
[15] Changwoo Song,et al. Secure and Efficient Recommendation Service of RFID System Using Authenticated Key Management , 2009, Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications.
[16] Michael Roberts,et al. Scalable architecture for context-aware activity-detecting mobile recommendation systems , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[17] Jameela Al-Jaroodi,et al. A Survey of Security Middleware for Pervasive and Ubiquitous Systems , 2009, 2009 International Conference on Network-Based Information Systems.
[18] Adenauer Yamin,et al. ISAMadapt: abstractions and tools for designing general-purpose pervasive applications: Experiences with Auto-adaptive and Reconfigurable Systems , 2006 .
[19] Ambuj Mahanti,et al. Strategies for Effective Shilling Attacks against Recommender Systems , 2009, PinKDD.
[20] Debra J. Richardson,et al. SRRS: a recommendation system for security requirements , 2008, RSSE '08.
[21] Gabriele Anderst-Kotsis,et al. Mobile recommendation systems for decision making 'on the go' , 2005, International Conference on Mobile Business (ICMB'05).
[22] Anind K. Dey,et al. Understanding and Using Context , 2001, Personal and Ubiquitous Computing.
[23] Lior Rokach,et al. Introduction to Recommender Systems Handbook , 2011, Recommender Systems Handbook.