Sciweavers

8701 search results - page 1671 / 1741
» Protecting information on the Web
Sort
View
MM
2006
ACM
157views Multimedia» more  MM 2006»
14 years 3 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
SIGUCCS
2006
ACM
14 years 3 months ago
Automated podcasting solution expands the boundaries of the classroom
A scalable podcast solution developed at the University of Washington makes the podcasting of class lectures easy for faculty by automating the capture, uploading, and delivery of...
David Aldrich, Bradley Bell, Tim Batzel
EEE
2005
IEEE
14 years 3 months ago
From Multi-Context Business Collaboration Models to Context-Specific ebXML BPSS
UN/CEFACT’s Modelling Methodology (UMM) is used to analyze and design B2B business processes. We extend UMM by a constraint mechanism for adding business environment-specific co...
Birgit Hofreiter, Christian Huemer
GROUP
2005
ACM
14 years 3 months ago
Proactive support for the organization of shared workspaces using activity patterns and content analysis
Shared workspace systems provide virtual places for selforganized and semi-structured cooperation between local and distributed team members. These cooperation systems have been a...
Wolfgang Prinz, Baber Zaman
CIKM
2005
Springer
14 years 3 months ago
Feature-based recommendation system
The explosive growth of the world-wide-web and the emergence of e-commerce has led to the development of recommender systems—a personalized information filtering technology use...
Eui-Hong Han, George Karypis
« Prev « First page 1671 / 1741 Last » Next »