Login / Signup

An attack resistant method for detecting dishonest recommendations in pervasive computing environment.

Naima IltafAbdul GhafoorUsman Zia
Published in: ICON (2012)
Keyphrases
  • pervasive computing
  • databases
  • machine learning
  • artificial intelligence
  • database systems
  • reinforcement learning
  • context aware
  • context awareness
  • smart environments
  • ambient intelligence systems