Sciweavers

180 search results - page 12 / 36
» Personal information management (PIM) 2008
Sort
View
DKE
2002
130views more  DKE 2002»
13 years 6 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber
CIKM
2008
Springer
13 years 8 months ago
Probabilistic polyadic factorization and its application to personalized recommendation
Multiple-dimensional, i.e., polyadic, data exist in many applications, such as personalized recommendation and multipledimensional data summarization. Analyzing all the dimensions...
Yun Chi, Shenghuo Zhu, Yihong Gong, Yi Zhang
CCS
2008
ACM
13 years 8 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
EUROSSC
2008
Springer
13 years 8 months ago
Gaussian Process Person Identifier Based on Simple Floor Sensors
Abstract. This paper describes methods and sensor technology used to identify persons from their walking characteristics. We use an array of simple binary switch floor sensors to d...
Jaakko Suutala, Kaori Fujinami, Juha Röning
CIKM
2008
Springer
13 years 8 months ago
Matching task profiles and user needs in personalized web search
Personalization has been deemed one of the major challenges in information retrieval with a significant potential for providing better search experience to individual users. Espec...
Julia Luxenburger, Shady Elbassuoni, Gerhard Weiku...