Sciweavers

7984 search results - page 221 / 1597
» Exploring personal information
Sort
View
ICASSP
2011
IEEE
13 years 2 months ago
Event classification for personal photo collections
People take more and more photos at different time and different events, however, these photos are often put into one giant folder and they are seldom annotated or organized. As t...
Feng Tang, Daniel Tretter, Chris Willis
CHI
2005
ACM
14 years 11 months ago
Making space for stories: ambiguity in the design of personal communication systems
Pervasive personal communication technologies offer the potential for important social benefits for individual users, but also the potential for significant social difficulties an...
Paul M. Aoki, Allison Woodruff
SIGMOD
2006
ACM
125views Database» more  SIGMOD 2006»
14 years 11 months ago
Personalized privacy preservation
We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for...
Xiaokui Xiao, Yufei Tao
ADMI
2009
Springer
14 years 5 months ago
Concept Learning for Achieving Personalized Ontologies: An Active Learning Approach
In many multiagent approaches, it is usual to assume the existence of a common ontology among agents. However, in dynamic systems, the existence of such an ontology is unrealistic ...
Murat Sensoy, Pinar Yolum
FC
2007
Springer
117views Cryptology» more  FC 2007»
14 years 5 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot