Sciweavers

15379 search results - page 231 / 3076
» Protecting users from
Sort
View
FLAIRS
1998
13 years 9 months ago
The Use of Function and Component Hierarchies to Generate User Information
This paper describes a technique which allows impaired functions to be automatically determined from the faulty components and vice versa. Moreover a knowledge base containing the...
Andreas Heinzelmann
WWW
2009
ACM
14 years 8 months ago
Mining interesting locations and travel sequences from GPS trajectories
The increasing availability of GPS-enabled devices is changing the way people interact with the Web, and brings us a large amount of GPS trajectories representing people's lo...
Yu Zheng, Lizhu Zhang, Xing Xie, Wei-Ying Ma
ISW
2005
Springer
14 years 1 months ago
A Privacy Preserving Rental System
Abstract. Rental records contain much sensitive information on individuals, so if abused by the rental service providers, user privacy could be jeopardized. To mitigate this concer...
Yanjiang Yang, Beng Chin Ooi
ACSAC
2000
IEEE
14 years 17 days ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
USENIX
1993
13 years 9 months ago
The Design and Implementation of the Inversion File System
This paper describes the design, implementation, and performance of the Inversion file system. Inversion provides a rich set of services to file system users, and manages a larg...
Michael A. Olson