Sciweavers

52 search results - page 6 / 11
» ACON: Activity-Centric Access Control for Social Computing
Sort
View
CHI
2010
ACM
14 years 2 months ago
Visual vs. compact: a comparison of privacy policy interfaces
In this paper, we compare the impact of two different privacy policy representations – AudienceView and Expandable Grids – on users modifying privacy policies for a social net...
Heather Richter Lipford, Jason Watson, Michael Whi...
ICECCS
2008
IEEE
168views Hardware» more  ICECCS 2008»
14 years 1 months ago
Ubiquitous Service Regulation Based on Dynamic Rules
Ubiquitous computing systems can be regarded as open systems where heterogeneous and previously unknown entities may spontaneously interact, due to intrinsic mobility of users and...
José Viterbo Filho, Markus Endler, Jean-Pie...
SOUPS
2009
ACM
14 years 1 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
HUC
2004
Springer
14 years 22 days ago
An Audio-Based Personal Memory Aid
We are developing a wearable device that attempts to alleviate some everyday memory problems. The “memory prosthesis” records audio and contextual information from conversation...
Sunil Vemuri, Chris Schmandt, Walter Bender, Stefa...
EUC
2008
Springer
13 years 9 months ago
Analyzing Privacy Designs of Mobile Social Networking Applications
The combined advances of open mobile platforms and online social networking applications (SNAs) are driving pervasive computing to the real-world users, as the mobile SNAs are exp...
Guanling Chen, Faruq Rahman