Sciweavers

730 search results - page 98 / 146
» Modeling trust in collaborative information systems
Sort
View
CCS
2008
ACM
13 years 11 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
WISE
2009
Springer
14 years 6 months ago
A Web Recommender System for Recommending, Predicting and Personalizing Music Playlists
In this paper, we present a Web recommender system for recommending, predicting and personalizing music playlists based on a user model. We have developed a hybrid similarity match...
Zeina Chedrawy, Syed Sibte Raza Abidi
ECIR
2010
Springer
13 years 10 months ago
Tripartite Hidden Topic Models for Personalised Tag Suggestion
Abstract. Social tagging systems provide methods for users to categorise resources using their own choice of keywords (or "tags") without being bound to a restrictive set...
Morgan Harvey, Mark Baillie, Ian Ruthven, Mark Jam...
MSWIM
2006
ACM
14 years 3 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda
CHI
2005
ACM
14 years 9 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai