Sciweavers

201 search results - page 33 / 41
» A Utility-Theoretic Approach to Privacy and Personalization
Sort
View
SEMWEB
2007
Springer
15 years 8 months ago
Access Control for Sharing Semantic Data across Desktops
Abstract. Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obvious...
Ekaterini Ioannou, Juri Luca De Coi, Arne Wolf Koe...
AAAIDEA
2005
IEEE
15 years 7 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
CSCW
2008
ACM
15 years 2 months ago
Imprint, a community visualization of printer data: designing for open-ended engagement on sustainability
We introduce Imprint, a casual information visualization kiosk that displays data extracted from a printer queue. We designed the system to be open-ended, and to support a workgro...
Zachary Pousman, Hafez Rouzati, John T. Stasko
109
Voted
FTIR
2007
119views more  FTIR 2007»
15 years 1 months ago
Opinion Mining and Sentiment Analysis
An important part of our information-gathering behavior has always been to find out what other people think. With the growing availability and popularity of opinion-rich resource...
Bo Pang, Lillian Lee
CCS
2007
ACM
15 years 8 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth