Sciweavers

490 search results - page 27 / 98
» Enabling User Control with Personal Identity Management
Sort
View
97
Voted
ICWSM
2008
15 years 1 months ago
Recommendation of Multimedia Items by Link Analysis and Collaborative Filtering
We investigate two recommendation approaches suitable for online multimedia sharing services. Our first approach, UserRank, recommends items by global interestingness irrespective...
Davin Wong, Ella Bingham, Saara Hyvönen
88
Voted
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 6 months ago
iMeMex: Escapes from the Personal Information Jungle
Modern computer work stations provide thousands of applications that store data in >100.000 files on the file system of the underlying OS. To handle these files data process...
Jens-Peter Dittrich, Marcos Antonio Vaz Salles, Do...
IUI
2011
ACM
14 years 3 months ago
Groups without tears: mining social topologies from email
As people accumulate hundreds of “friends” in social media, a flat list of connections becomes unmanageable. Interfaces agnostic to social structure hinder the nuanced sharin...
Diana MacLean, Sudheendra Hangal, Seng Keat Teh, M...
IHI
2012
353views Healthcare» more  IHI 2012»
13 years 8 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
93
Voted
ADC
2007
Springer
150views Database» more  ADC 2007»
15 years 6 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi