Sciweavers

95 search results - page 13 / 19
» Implicit personalization of public environments using blueto...
Sort
View
ICPPW
2005
IEEE
15 years 3 months ago
Content Oriented Communications for Emergencies in Wireless Environments
In the conventional WWW search or P2P file sharing systems, users search for some information by using the Explicit Information such as keywords, addresses or content names. Howev...
Kazuya Sakai, Hiroki Nakano, Akiko Nakaniwa, Hiroy...
73
Voted
CHI
2003
ACM
15 years 9 months ago
PhotoPhone entertainment
We demonstrate two complementary interaction techniques for electronic large displays that are designed for cameraequipped mobile phones. The first one enables the direct selectio...
Johan Thoresson
76
Voted
DMIN
2007
183views Data Mining» more  DMIN 2007»
14 years 11 months ago
Crawling Attacks Against Web-based Recommender Systems
—User profiles derived from Web navigation data are used in important e-commerce applications such as Web personalization, recommender systems, and Web analytics. In the open en...
Runa Bhaumik, Robin D. Burke, Bamshad Mobasher
CHI
2007
ACM
15 years 1 months ago
Capturing, sharing, and using local place information
With new technology, people can share information about everyday places they go; the resulting data helps others find and evaluate places. Recent applications like Dodgeball and S...
Pamela J. Ludford, Reid Priedhorsky, Ken Reily, Lo...
DIM
2005
ACM
14 years 11 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...