Sciweavers

912 search results - page 140 / 183
» Ontology Based User Modeling for Personalized Information Ac...
Sort
View
POLICY
2007
Springer
14 years 1 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
MHCI
2005
Springer
14 years 1 months ago
Rolling, rotating and imagining in a virtual mobile world
New mobile devices can be difficult to use because they give users access to powerful computing devices through small interfaces, which typically have limited input facilities. On...
Lynne Baillie, Harald Kunczier, Hermann Anegg
WWW
2005
ACM
14 years 8 months ago
Improving understanding of website privacy policies with fine-grained policy anchors
Website privacy policies state the ways that a site will use personal identifiable information (PII) that is collected from fields and forms in web-based transactions. Since these...
Stephen E. Levy, Carl Gutwin
JSAC
2008
90views more  JSAC 2008»
13 years 7 months ago
Limited feedback schemes for downlink OFDMA based on sub-channel groups
Abstract--In a downlink Orthogonal Frequency Division Multiple Access (OFDMA) system, optimally allocating sub-channels across mobile users can require excessive feedback of channe...
Jieying Chen, Randall A. Berry, Michael L. Honig
WWW
2006
ACM
14 years 8 months ago
Detecting online commercial intention (OCI)
Understanding goals and preferences behind a user's online activities can greatly help information providers, such as search engine and E-Commerce web sites, to personalize c...
Honghua (Kathy) Dai, Lingzhi Zhao, Zaiqing Nie, Ji...