Sciweavers

442 search results - page 76 / 89
» Information revelation and privacy in online social networks
Sort
View
EUROPKI
2004
Springer
15 years 5 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
ACL
2010
14 years 9 months ago
A Unified Graph Model for Sentence-Based Opinion Retrieval
There is a growing research interest in opinion retrieval as on-line users' opinions are becoming more and more popular in business, social networks, etc. Practically speakin...
Binyang Li, Lanjun Zhou, Shi Feng, Kam-Fai Wong
ASSETS
2009
ACM
15 years 4 months ago
Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators
The difficulties of navigating vocabulary in an assistive communication device are exacerbated for individuals with lexical access disorders like those due to aphasia. We present ...
Sonya S. Nikolova, Jordan L. Boyd-Graber, Christia...
IDTRUST
2009
ACM
15 years 6 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
CHI
2010
ACM
15 years 6 months ago
Video microblogging: your 12 seconds of fame
Microblogging is a recently popular phenomenon and with the increasing trend for video cameras to be built into mobile phones, a new type of microblogging has entered the arena of...
Nis Bornoe, Louise Barkhuus