Sciweavers

103 search results - page 3 / 21
» Privacy for a Networked World: bridging theory and design
Sort
View
CHI
2009
ACM
14 years 6 months ago
Predicting tie strength with social media
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic...
Eric Gilbert, Karrie Karahalios
CIE
2007
Springer
13 years 12 months ago
RZ: A Tool for Bringing Constructive and Computable Mathematics Closer to Programming Practice
Realizability theory is not just a fundamental tool in logic and computability. It also has direct application to the design and implementation of programs, since it can produce co...
Andrej Bauer, Christopher A. Stone
PDC
2004
ACM
13 years 11 months ago
From small scale to large scale user participation: a case study of participatory design in e-government systems
Most experiments with participative design are with small scale, stand alone and not very strategic applications of ICT in organizations. However, modern ICT applications are incr...
Anne-Marie Oostveen, Peter Van den Besselaar
ICDM
2010
IEEE
157views Data Mining» more  ICDM 2010»
13 years 3 months ago
Privacy Violations Using Microtargeted Ads: A Case Study
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
Aleksandra Korolova
SENSYS
2005
ACM
13 years 11 months ago
MAX: human-centric search of the physical world
MAX is a system that facilitates human-centric search of the physical world. It allows humans to search for and locate objects as and when they need it instead of organizing them ...
Kok-Kiong Yap, Vikram Srinivasan, Mehul Motani