Sciweavers

1251 search results - page 82 / 251
» Management of User Preferences in Data Intensive Application...
Sort
View
150
Voted
RTCSA
2007
IEEE
15 years 10 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
175
Voted
HICSS
1999
IEEE
267views Biometrics» more  HICSS 1999»
15 years 8 months ago
Annotate: A Web-based Knowledge Management Support System for Document Collections
Knowledge management is an increasingly important source of competitive advantage for organizations. Knowledge is a renewable, re-usable and accumulating asset of value to firms t...
Mark Ginsburg, Ajit Kambil
140
Voted
SIGIR
2010
ACM
15 years 7 months ago
Ready to buy or just browsing?: detecting web searcher goals from interaction data
An improved understanding of the relationship between search intent, result quality, and searcher behavior is crucial for improving the effectiveness of web search. While recent p...
Qi Guo, Eugene Agichtein
116
Voted
ACISICIS
2010
IEEE
15 years 5 months ago
One-Finger Interaction for Ubiquitous Environment
We propose new interaction techniques named "One-finger Interaction" in the ubiquitous environment in a home. One-finger Interaction is an interaction technique for doing...
Takashi Nakamura, Shin Takahashi, Jiro Tanaka
135
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino