Sciweavers

478 search results - page 70 / 96
» Privacy and pricing personal information
Sort
View
SOUPS
2010
ACM
14 years 15 days ago
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit...
SIGECOM
2011
ACM
219views ECommerce» more  SIGECOM 2011»
12 years 11 months ago
GSP auctions with correlated types
The Generalized Second Price (GSP) auction is the primary method by which sponsered search advertisements are sold. We study the performance of this auction in the Bayesian settin...
Brendan Lucier, Renato Paes Leme
CSCW
2002
ACM
13 years 8 months ago
Who can claim complete abstinence from peeking at print jobs?
While systems supporting communities of practice in work organizations have been shown to be desirable many, if not all, are decoupled from daily work practices and tools. This hi...
Antonietta Grasso, Jean-Luc Meunier
HICSS
2002
IEEE
150views Biometrics» more  HICSS 2002»
14 years 1 months ago
An Architecture for Location Aware Applications
This paper presents an architecture for location aware applications, where positioning sources such as GPS, WaveLAN and Bluetooth devices can be seamlessly interchanged or even co...
James Nord, Kåre Synnes, Peter Parnes
WWW
2008
ACM
14 years 9 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen