Sciweavers

201 search results - page 33 / 41
» A Utility-Theoretic Approach to Privacy and Personalization
Sort
View
SEMWEB
2007
Springer
15 years 5 months ago
Access Control for Sharing Semantic Data across Desktops
Abstract. Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obvious...
Ekaterini Ioannou, Juri Luca De Coi, Arne Wolf Koe...
132
Voted
AAAIDEA
2005
IEEE
15 years 5 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
CSCW
2008
ACM
15 years 23 days ago
Imprint, a community visualization of printer data: designing for open-ended engagement on sustainability
We introduce Imprint, a casual information visualization kiosk that displays data extracted from a printer queue. We designed the system to be open-ended, and to support a workgro...
Zachary Pousman, Hafez Rouzati, John T. Stasko
FTIR
2007
119views more  FTIR 2007»
14 years 11 months ago
Opinion Mining and Sentiment Analysis
An important part of our information-gathering behavior has always been to find out what other people think. With the growing availability and popularity of opinion-rich resource...
Bo Pang, Lillian Lee
CCS
2007
ACM
15 years 5 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth