Sciweavers

981 search results - page 143 / 197
» Personalization and User Profile Management
Sort
View
CCS
2004
ACM
15 years 10 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
15 years 3 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
JCDL
2004
ACM
116views Education» more  JCDL 2004»
15 years 10 months ago
Lost in memories: interacting with photo collections on PDAs
We developed two browsers to support large personal photo collections on PDAs. Our first browser is based on a traditional, folder-based layout that utilizes either the user’s m...
Susumu Harada, Mor Naaman, Yee Jiun Song, QianYing...
MOBISYS
2009
ACM
16 years 5 months ago
Longitudinal study of a building-scale RFID ecosystem
Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such depl...
Evan Welbourne, Karl Koscher, Emad Soroush, Magdal...
CIKM
2001
Springer
15 years 9 months ago
Keeping Found Things Found on the Web
This paper describes the results of an observational study into the methods people use to manage web information for re-use. People observed in our study used a diversity of metho...
William P. Jones, Harry Bruce, Susan T. Dumais