Sciweavers

1708 search results - page 73 / 342
» Associative personal information management
Sort
View
DKE
2002
130views more  DKE 2002»
13 years 9 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber
DSS
2008
127views more  DSS 2008»
13 years 9 months ago
Cross-lingual thesaurus for multilingual knowledge management
The Web is a universal repository of human knowledge and culture which has allowed unprecedented sharing of ideas and information in a scale never seen before. It can also be cons...
Christopher C. Yang, Chih-Ping Wei, K. W. Li
INTERSPEECH
2010
13 years 4 months ago
Prosody and voice quality of vocal social signals: the case of dominance in scenario meetings
In this paper we investigate the prosody and voice quality of dominance in scenario meetings. We have found that in these scenarios the most dominant person tends to speak with a ...
Marcela Charfuelan, Marc Schröder, Ingmar Ste...
WISE
2007
Springer
14 years 3 months ago
Privacy Inspection and Monitoring Framework for Automated Business Processes
More and more personal data is exposed to automatic and programmatic access, making it more difficult to safeguard the personal information from unauthorised access at every step. ...
Yin Hua Li, Hye-Young Paik, Jun Chen
COMPSAC
2006
IEEE
14 years 3 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver