Sciweavers

343 search results - page 33 / 69
» The All-In Publication Policy
Sort
View
NSPW
2006
ACM
14 years 4 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
PDC
2006
ACM
14 years 4 months ago
Oppositional and activist new media: remediation, reconfiguration, participation
Over the last decade, the major firms and cultural institutions that have dominated media and information industries in the U.S. and globally have been challenged by people adopti...
Leah A. Lievrouw
MHCI
2005
Springer
14 years 4 months ago
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Context-aware applications can better meet users’ needs when sensing agents installed in the environment automatically provide input relevant to the application. However, this n...
Dan Hong, Mingxuan Yuan, Vincent Y. Shen
HICSS
2003
IEEE
172views Biometrics» more  HICSS 2003»
14 years 4 months ago
Convergence Through Solution Interoperability: Case Study of Integrated Telecommunication Design and Incremental Deployment
Researchers have cogently presented the technical case for converged telecommunications systems. However, it is not clear how market-based telecommunications providers are embraci...
Thomas A. Horan, Benjamin L. Schooley
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
14 years 4 months ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov