Sciweavers

589 search results - page 37 / 118
» Evaluating mobile phones as risk information providers
Sort
View
ICDM
2007
IEEE
101views Data Mining» more  ICDM 2007»
14 years 3 months ago
Lightweight Distributed Trust Propagation
Using mobile devices, such as smart phones, people may create and distribute different types of digital content (e.g., photos, videos). One of the problems is that digital content...
Daniele Quercia, Stephen Hailes, Licia Capra
ICDE
2009
IEEE
192views Database» more  ICDE 2009»
14 years 10 months ago
Deriving Private Information from Association Rule Mining Results
Data publishing can provide enormous benefits to the society. However, due to privacy concerns, data cannot be published in their original forms. Two types of data publishing can a...
Zutao Zhu, Guan Wang, Wenliang Du
CHI
2003
ACM
14 years 9 months ago
Navigating in a mobile XHTML application
The Internet has been a great success in the fixed world, whereas WAP (Wireless Application Protocol), the mobile Internet, has not fulfilled its promise. However, now the analyst...
Anne Kaikkonen, Virpi Roto
ICMI
2005
Springer
170views Biometrics» more  ICMI 2005»
14 years 2 months ago
The connector: facilitating context-aware communication
We present the Connector, a context-aware service that intelligently connects people. It maintains an awareness of its users' activities, preoccupations and social relationsh...
Maria Danninger, G. Flaherty, Keni Bernardin, Hazi...
IWIA
2005
IEEE
14 years 2 months ago
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
Stephen Boyer, Oliver Dain, Robert Cunningham