Sciweavers

91 search results - page 9 / 19
» Architecting Pervasive Computing Systems for Privacy: A Surv...
Sort
View
76
Voted
TRUSTBUS
2007
Springer
15 years 3 months ago
The Meaning of Logs
While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not ...
Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
107
Voted
LOCA
2009
Springer
15 years 4 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung
69
Voted
FAST
2003
14 years 11 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
SIGIR
2002
ACM
14 years 9 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
15 years 2 months ago
The Chief Information Officer: A Study of Managerial Roles in Norway
This study provides some empirical insight into managerial roles of chief information officer (CIO) based on Mintzberg's classic managerial role model and CSC's informat...
Petter Gottschalk