Sciweavers

929 search results - page 65 / 186
» Personal information management with SEMEX
Sort
View
SIGMOD
2008
ACM
198views Database» more  SIGMOD 2008»
14 years 9 months ago
Efficient storage scheme and query processing for supply chain management using RFID
As the size of an RFID tag becomes smaller and the price of the tag gets lower, RFID technology has been applied to a wide range of areas. Recently, RFID has been adopted in the b...
Chun-Hee Lee, Chin-Wan Chung
SOUPS
2009
ACM
14 years 3 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 4 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
14 years 3 months ago
Mobilizing Customer Relationship Management - A Journey from Strategy to System Design
The bursting of the e-bubble affected expectations with regard to mobile initiatives and willingness to invest in them very negatively. In both academia and practice, there has re...
Ragnar Schierholz, Lutz Kolbe, Walter Brenner
DIM
2005
ACM
13 years 11 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...