Sciweavers

420 search results - page 21 / 84
» Data unification in personal information management
Sort
View
JSW
2008
101views more  JSW 2008»
13 years 10 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
HT
2005
ACM
14 years 4 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
BMCBI
2007
134views more  BMCBI 2007»
13 years 11 months ago
PLAN: a web platform for automating high-throughput BLAST searches and for managing and mining results
Background: BLAST searches are widely used for sequence alignment. The search results are commonly adopted for various functional and comparative genomics tasks such as annotating...
Ji He, Xinbin Dai, Xuechun Zhao
COLCOM
2009
IEEE
14 years 3 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
HCI
2007
14 years 8 days ago
Privacy Requirements in Identity Management Solutions
In this paper we highlight the need for privacy of user data used in digital identity management systems. We investigate the issues from the individual, business, and government pe...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...