Sciweavers

180 search results - page 18 / 36
» Personal information management (PIM) 2008
Sort
View
CIKM
2008
Springer
13 years 8 months ago
Conflict ontology enrichment based on triggers
In this paper, we propose an ontology-based approach that enables to detect the emergence of relational conflicts between persons that cooperate on computer supported projects. In...
Chahnez Zakaria, Olivier Curé, Kamel Sma&iu...
NSDI
2008
13 years 9 months ago
Understanding Privacy Settings in Facebook with an Audience View
Users of online social networking communities are disclosing large amounts of personal information, putting themselves at a variety of risks. Our ongoing research investigates mec...
Heather Richter Lipford, Andrew Besmer, Jason Wats...
DELTA
2008
IEEE
13 years 8 months ago
On Using Fingerprint-Sensors for PIN-Pad Entry
Automatic fingerprint authentication is an integral part in many security systems. Because not every person is always suited to that technology, a general purpose security system ...
Marcel Jacomet, Josef Goette, Andreas Eicher
CIKM
2008
Springer
13 years 8 months ago
Efficient sampling of information in social networks
As online social networking emerges, there has been increased interest to utilize the underlying social structure as well as the available social information to improve search. In...
Gautam Das, Nick Koudas, Manos Papagelis, Sushruth...
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
13 years 8 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi