Sciweavers

408 search results - page 33 / 82
» Tailoring Privacy to Users' Needs
Sort
View
CHI
2005
ACM
14 years 8 months ago
Extensible input handling in the subArctic toolkit
The subArctic user interface toolkit has extensibility as one of its central goals. It seeks not only to supply a powerful library of reusable interactive objects, but also make i...
Scott E. Hudson, Jennifer Mankoff, Ian E. Smith
JCDL
2010
ACM
161views Education» more  JCDL 2010»
13 years 6 months ago
Search behaviors in different task types
Personalization of information retrieval tailors search towards individual users to meet their particular information needs by taking into account information about users and thei...
Jingjing Liu, Michael J. Cole, Chang Liu, Ralf Bie...
AGENTS
1998
Springer
14 years 8 days ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
MDAI
2007
Springer
14 years 2 months ago
A Public-Key Protocol for Social Networks with Private Relationships
Abstract. The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks...
Josep Domingo-Ferrer
MDM
2007
Springer
125views Communications» more  MDM 2007»
14 years 2 months ago
Extending P3P/Appel for Friend Finder
FriendFinder as a location-based service collects location data from mobile users and distributes a particular user’s location upon request. Privacy of users data especially loc...
Emin Islam Tatli