Sciweavers

506 search results - page 61 / 102
» The Platform for Privacy Preferences
Sort
View
ECRIME
2007
14 years 22 days ago
Fishing for phishes: applying capture-recapture methods to estimate phishing populations
We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estima...
Rhiannon Weaver, M. Patrick Collins
PST
2004
13 years 10 months ago
The Sensitivities of User Profile Information in Music Recommender Systems
Personalized services can cause privacy concerns, due to the acquisition, storage and application of sensitive personal information. This paper describes empirical research into th...
Evelien van de Garde-Perik, Boris E. R. de Ruyter,...
IJCAI
1997
13 years 10 months ago
Middle-Agents for the Internet
Like middle-men in physical commerce, middleagents support the flow of information in electronic commerce, assisting in locating and connecting the ultimate information provider ...
Keith Decker, Katia P. Sycara, Mike Williamson
JUCS
2006
102views more  JUCS 2006»
13 years 8 months ago
A Mechanism for Solving Conflicts in Ambient Intelligent Environments
: Ambient Intelligence scenarios describe situations in which multitude of devices and agents live together. In this kind ofscenarios is frequent to see the appearance ofconflicts ...
Pablo A. Haya, Germán Montoro, Abraham Esqu...
ICWS
2009
IEEE
14 years 6 months ago
Change Detection and Correction Facilitation for Web Applications and Services
There are a large number of websites serving valuable content that can be used by higher-level applications, Web Services, Mashups etc. Yet, due to various reasons (lack of comput...
Alfredo Alba, Varun Bhagwan, Tyrone Grandison, Dan...