Sciweavers

464 search results - page 79 / 93
» Identity Management for Self-Portrayal
Sort
View
SIGIR
2006
ACM
14 years 1 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
HICSS
2005
IEEE
156views Biometrics» more  HICSS 2005»
14 years 29 days ago
Strategies Supporting Heterogeneous Data and Interdisciplinary Collaboration: Towards an Ocean Informatics Environment
This paper considers the elements and challenges of heterogeneous data management and interdisciplinary collaboration, drawing from the literatures on participatory design, comput...
Karen S. Baker, Steven J. Jackson, Jerome R. Wanet...
SACMAT
2005
ACM
14 years 28 days ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
DRM
2004
Springer
14 years 23 days ago
Analysis of an incentives-based secrets protection system
Once electronic content has been released it is very difficult to prevent copies of the content from being widely distributed. Such distribution can cause economic harm to the con...
N. Boris Margolin, Matthew Wright, Brian Neil Levi...
KDD
2004
ACM
161views Data Mining» more  KDD 2004»
14 years 22 days ago
ANN quality diagnostic models for packaging manufacturing: an industrial data mining case study
World steel trade becomes more competitive every day and new high international quality standards and productivity levels can only be achieved by applying the latest computational...
Nicolás de Abajo, Alberto B. Diez, Vanesa L...