Sciweavers

1018 search results - page 183 / 204
» Remote User Authentication Using Public Information
Sort
View
MOBIDE
1999
ACM
14 years 4 days ago
Pervasive Computing: What is it Good for?
The first mass-produced pervasive computing devices are starting to appear—the AutoPC, the Internet-connected ScreenFridge, and the combination Microwave Oven/Home Banking term...
Andrew C. Huang, Benjamin C. Ling, Shankar Ponneka...
WSDM
2012
ACM
301views Data Mining» more  WSDM 2012»
12 years 3 months ago
Learning evolving and emerging topics in social media: a dynamic nmf approach with temporal regularization
As massive repositories of real-time human commentary, social media platforms have arguably evolved far beyond passive facilitation of online social interactions. Rapid analysis o...
Ankan Saha, Vikas Sindhwani
CHI
2010
ACM
14 years 2 months ago
Cleanly: trashducation urban system
Half the world’s population is expected to live in urban areas by 2020. The high human density and changes in peoples’ consumption habits result in an everincreasing amount of...
Inbal Reif, Florian Alt, Juan David Hincapié...
ACMDIS
2006
ACM
14 years 1 months ago
Staying open to interpretation: engaging multiple meanings in design and evaluation
Human-Computer Interaction (HCI) often focuses on how designers can develop systems that convey a single, specific, clear interpretation of what they are for and how they should b...
Phoebe Sengers, Bill Gaver
WPES
2004
ACM
14 years 1 months ago
Assessing global disclosure risk in masked microdata
In this paper, we introduce a general framework for microdata and three disclosure risk measures (minimal, maximal and weighted). We classify the attributes from a given microdata...
Traian Marius Truta, Farshad Fotouhi, Daniel C. Ba...