Sciweavers

14 search results - page 2 / 3
» Privacy risk models for designing privacy-sensitive ubiquito...
Sort
View
SIGIR
2002
ACM
13 years 8 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
PERCOM
2009
ACM
14 years 3 months ago
Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments
—Ensuring spontaneous ad hoc interoperation in decentralized ubiquitous computing environments is challenging, because of heterogeneous resources and divergent policies. Centrali...
Venkatraman Ramakrishna, Peter L. Reiher, Leonard ...
LOCWEB
2009
ACM
14 years 3 months ago
Binding privacy rules to location on the web
As a tool for mitigating the potential privacy risks of gathering and transmitting location information on the Web, we suggest in this paper a model for conveying location informa...
Alissa Cooper, John Morris
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 11 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
CHI
2009
ACM
14 years 1 months ago
Stress outsourced: a haptic social network via crowdsourcing
Stress OutSourced (SOS) is a peer-to-peer network that allows anonymous users to send each other therapeutic massages to relieve stress. By applying the emerging concept of crowds...
Keywon Chung, Carnaven Chiu, Xiao Xiao, Pei-Yu (Pe...