Sciweavers

18 search results - page 3 / 4
» Privacy in e-commerce: examining user scenarios and privacy ...
Sort
View
CP
2008
Springer
13 years 9 months ago
Elicitation Strategies for Fuzzy Constraint Problems with Missing Preferences: Algorithms and Experimental Studies
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
DEBU
2002
81views more  DEBU 2002»
13 years 7 months ago
Profiling and Service Delivery in Internet-enabled Cars
This paper presents our experience applying web services and active database technology in an automotive scenario. Particularly, we concentrate on developing an infrastructure for...
Mariano Cilia, Alejandro P. Buchmann
ESORICS
2007
Springer
14 years 1 months ago
Graphical Password Authentication Using Cued Click Points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
14 years 7 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
AGENTS
2000
Springer
13 years 11 months ago
Experimental assessment of the effectiveness of synthetic personae for multi-modal e-retail applications
This paper details results of an experiment to empirically evaluate the effectiveness and user acceptability of human-like synthetic agents in a multi-modal electronic retail scen...
Helen McBreen, Paul Shade, Mervyn A. Jack, Peter J...