Sciweavers

43 search results - page 5 / 9
» Preventing information leakage between collaborating organis...
Sort
View
CHI
2007
ACM
14 years 8 months ago
AwareLESS authentication: insensible input based authentication
To increase the security of handheld devices, we propose awareLESS authentication. Since insensible input prevents the leakage of the key information, it can provide more secure a...
Hiroyuki Manabe, Masaaki Fukumoto
CIKM
2009
Springer
14 years 2 months ago
User-induced links in collaborative tagging systems
Collaborative tagging systems allow users to use tags to describe their favourite online documents. Two documents that are maintained in the collection of the same user and/or ass...
Ching-man Au Yeung, Nicholas Gibbins, Nigel Shadbo...
ECIS
2003
13 years 9 months ago
A case of 'non strategic' alignment - An IT and business unit liaison role
The nature of higher-level interactions in facilitating strategic alignment has received much attention in the past decade. The study sets out to explore the nature of the interac...
Owen Harte Barry, Brian O'Flaherty
ADMA
2008
Springer
186views Data Mining» more  ADMA 2008»
14 years 1 months ago
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
Chunhua Su, Kouichi Sakurai
UM
2010
Springer
14 years 18 days ago
Task-Based User Modelling for Knowledge Work Support
A Knowledge Worker (KW) uses her computer to perform different tasks for which she gathers and uses information from disparate sources such as the Web and e-mail, and creates new ...
Charlie Abela, Chris Staff, Siegfried Handschuh