Sciweavers

365 search results - page 5 / 73
» Determining Internet Users' Values for Private Information
Sort
View
SP
2007
IEEE
102views Security Privacy» more  SP 2007»
14 years 1 months ago
Improving the Robustness of Private Information Retrieval
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modificati...
Ian Goldberg
IJCSA
2006
75views more  IJCSA 2006»
13 years 7 months ago
The Recommendation Mechanism in an Internet Information System with Time Impact Coefficient
: In this paper we propose two generic mechanisms implemented in a cadastre internet information system. The first one is the list of last queries submitted by a given user and the...
Dariusz Król, Michal Szymanski, Bogdan Traw...
ICWS
2010
IEEE
13 years 5 months ago
User Experience in Added Value Location-Based Mobile Music Service
— In this paper, the user experience in added value location-based mobile music service called the City Night Life (CNL) is evaluated and analyzed. The CNL service provides recom...
Timo Koskela, Sari Järvinen, Meirong Liu, Mik...
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
14 years 1 months ago
Contextual e-Negotiation for the Handling of Private Data in e-Commerce on a Semantic Web
In this paper, we describe data support in an information system to support contextual, online negotiation of privacy contracts for e-commerce on the Semantic Web. Context is impo...
Yingxin (Sheila) He, Dawn N. Jutla
WWW
2003
ACM
14 years 8 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...