Sciweavers

408 search results - page 28 / 82
» Tailoring Privacy to Users' Needs
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
MOBISYS
2005
ACM
14 years 7 months ago
DeltaCast: efficient file reconciliation in wireless broadcast systems
Recently, there has been an increasing interest in wireless broadcast systems as a means to enable scalable content delivery to large numbers of mobile users. However, gracefully ...
Julian Chesterfield, Pablo Rodriguez
ICIA
2007
13 years 10 months ago
Task Learning by Instruction: Benefits and Challenges for Intelligent Interactive Systems
The CALO desktop assistant aims to provide assistance through many AI technologies, including several techniques for learning to perform tasks. Based on our experiences implementi...
Jim Blythe, Prateek Tandon, Mandar Tillu
GRC
2007
IEEE
14 years 2 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
IWSEC
2007
Springer
14 years 2 months ago
Privacy-Preserving Eigentaste-Based Collaborative Filtering
With the evolution of e-commerce, privacy is becoming a major concern. Many e-companies employ collaborative filtering (CF) techniques to increase their sales by providing truthfu...
Ibrahim Yakut, Huseyin Polat