Sciweavers

248 search results - page 31 / 50
» A study of preferences for sharing and privacy
Sort
View
ISI
2005
Springer
15 years 3 months ago
Private Mining of Association Rules
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Justin Z. Zhan, Stan Matwin, LiWu Chang
JCP
2007
105views more  JCP 2007»
14 years 9 months ago
Intuitive Network Applications: Learning for Personalized Converged Services Involving Social Networks
Abstract— The convergence of the wireline telecom, wireless telecom, and internet networks and the services they provide offers tremendous opportunities in services personalizati...
Robert Dinoff, Tin Kam Ho, Richard Hull, Bharat Ku...
CSCW
2000
ACM
15 years 2 months ago
Designing to support adversarial collaboration
We investigate the phenomenon of adversarial collaboration, through field studies of a legal firm. Adversarial collaboration requires that people with opposing goals come to agree...
Andrew L. Cohen, Debra Cash, Michael J. Muller
ESORICS
2007
Springer
15 years 3 months ago
Graphical Password Authentication Using Cued Click Points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...
WEBI
2004
Springer
15 years 3 months ago
Mining Local Data Sources For Learning Global Cluster Models
— Distributed data mining has recently caught a lot of attention as there are many cases where pooling distributed data for mining is probibited, due to either huge data volume o...
Chak-Man Lam, Xiaofeng Zhang, William Kwok-Wai Che...