Sciweavers

8479 search results - page 1572 / 1696
» Data Extraction from Web Data Sources
Sort
View
127
Voted
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
16 years 16 days ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
127
Voted
IUI
2009
ACM
16 years 6 days ago
Using salience to segment desktop activity into projects
Knowledge workers must manage large numbers of simultaneous, ongoing projects that collectively involve huge numbers of resources (documents, emails, web pages, calendar items, et...
Daniel Lowd, Nicholas Kushmerick
130
Voted
SAC
2009
ACM
15 years 10 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
125
Voted
CSE
2009
IEEE
15 years 10 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
126
Voted
WETICE
2009
IEEE
15 years 10 months ago
A Gossip-Based Distributed Social Networking System
—Social networking web sites, which allow users to create identities and link them to friends who have also created identities, are highly popular. Systems such as Facebook and M...
S. M. A. Abbas, Johan A. Pouwelse, Dick H. J. Epem...
« Prev « First page 1572 / 1696 Last » Next »