Sciweavers

1618 search results - page 161 / 324
» Privacy Interfaces for Information Management
Sort
View
96
Voted
IHM
2004
ACM
15 years 9 months ago
Conception participative par "moments"
This paper describes an approach for the participatory design. After describing the trends in the domain, a formalization of the design process is expressed based on « phase »...
Jean Caelen, Francis Jambon
127
Voted
CCS
2009
ACM
15 years 10 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
134
Voted
ISCC
2005
IEEE
15 years 9 months ago
Link Triggers Assisted Optimizations for Mobile IPv4/v6 Vertical Handovers
This document describes a mechanism that enhances Mobile IP protocols to smoothly manage handovers for Mobile Nodes equipped with multiple interfaces and moving across different l...
Nicolas Montavont, Eric Njedjou, Franck Lebeugle, ...
111
Voted
WSC
2004
15 years 5 months ago
Design Specifications of a Generic Supply Chain Simulator
This paper describes a design specification for a generic, supply-chain-simulation system. The proposed simulation system is based on schedule-driven and stock-driven control meth...
Shigeki Umeda, Y. Tina Lee
128
Voted
CIKM
2009
Springer
15 years 10 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau