Sciweavers

931 search results - page 81 / 187
» Management of personal information scraps
Sort
View
CCS
2011
ACM
14 years 1 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
CHI
2004
ACM
16 years 1 months ago
The perfect search engine is not enough: a study of orienteering behavior in directed search
This paper presents a modified diary study that investigated how people performed personally motivated searches in their email, in their files, and on the Web. Although earlier st...
Jaime Teevan, Christine Alvarado, Mark S. Ackerman...
CIKM
2008
Springer
15 years 3 months ago
Modeling multi-step relevance propagation for expert finding
An expert finding system allows a user to type a simple text query and retrieve names and contact information of individuals that possess the expertise expressed in the query. Thi...
Pavel Serdyukov, Henning Rode, Djoerd Hiemstra
CAISE
2007
Springer
15 years 7 months ago
Conceptual Modeling of Privacy-Aware Web Service Protocols
Abstract. Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stor...
Rachid Hamadi, Hye-Young Paik, Boualem Benatallah
MM
2004
ACM
139views Multimedia» more  MM 2004»
15 years 6 months ago
MobShare: controlled and immediate sharing of mobile images
In this paper we describe the design and implementation of a mobile phone picture sharing system MobShare that enables immediate, controlled, and organized sharing of mobile pictu...
Risto Sarvas, Mikko Viikari, Juha Pesonen, Hanno N...