Sciweavers

4334 search results - page 714 / 867
» Distributed Data Management Support for Collaborative Comput...
Sort
View
MHCI
2009
Springer
15 years 8 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
IEEESCC
2007
IEEE
15 years 8 months ago
Business-Activity Driven Search: Addressing the Information Needs of Services Professionals
Services business generates significant amount of human and machine created data. Search and discovery of relevant information from this data is a critical factor in enhancing wor...
Nithya Rajamani, Murthy V. Devarakonda, Yu Deng, W...
ACCV
1998
Springer
15 years 6 months ago
Montage: An Image Database for the Fashion, Textile, and Clothing Industry in Hong Kong
Abstract. The fashion, textile, and clothing industry is a main constituent in Hong Kong. In this industry, handling a large amount of images is an important task in various phases...
Tak-Kan Lau, Irwin King
80
Voted
NSDI
2007
15 years 4 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
CSE
2009
IEEE
15 years 8 months ago
Implementing Social Norms Using Policies
—Multi-agent systems are difficult to develop. One reason for this is that agents are embedded in a society where all agents must agree to obey certain social norms in order for...
Robert Kremer