Sciweavers

343 search results - page 47 / 69
» The All-In Publication Policy
Sort
View
CSCW
2006
ACM
14 years 4 months ago
Context-aware telephony: privacy preferences and sharing patterns
The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. Context-aware telephony applications, in which callers are provided with cont...
Ashraf Khalil, Kay Connelly
SAC
2006
ACM
14 years 4 months ago
A privacy preserving web recommender system
In this paper we propose a recommender system that helps users to navigate though the Web by providing dynamically generated links to pages that have not yet been visited and are ...
Ranieri Baraglia, Claudio Lucchese, Salvatore Orla...
SIGCSE
2006
ACM
127views Education» more  SIGCSE 2006»
14 years 4 months ago
SNITCH: a software tool for detecting cut and paste plagiarism
Plagiarism of material from the Internet is a widespread and growing problem. Computer science students, and those in other science and engineering courses, can sometimes get away...
Sebastian Niezgoda, Thomas P. Way
WPES
2006
ACM
14 years 4 months ago
Private social network analysis: how to assemble pieces of a graph privately
Connections in distributed systems, such as social networks, online communities or peer-to-peer networks, form complex graphs. These graphs are of interest to scientists in field...
Keith B. Frikken, Philippe Golle
WPES
2006
ACM
14 years 4 months ago
A study on the value of location privacy
This paper introduces results of a study into the value of location privacy for individuals using mobile devices. We questioned a sample of over 1200 people from five EU countrie...
Daniel Cvrcek, Marek Kumpost, Vashek Matyas, Georg...