Sciweavers

931 search results - page 88 / 187
» Management of personal information scraps
Sort
View
CIKM
2010
Springer
15 years 13 hour ago
You are where you tweet: a content-based approach to geo-locating twitter users
We propose and evaluate a probabilistic framework for estimating a Twitter user’s city-level location based purely on the content of the user’s tweets, even in the absence of ...
Zhiyuan Cheng, James Caverlee, Kyumin Lee
CCS
2009
ACM
16 years 2 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
DIM
2007
ACM
15 years 5 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
SIGUCCS
2005
ACM
15 years 7 months ago
Universal imaging: revolutionizing desktop support
Lehigh University has recently implemented a new PC deployment model which is built around the Universal Imaging Utility, a product of Big Bang, LLC. This model has allowed Lehigh...
Stephen G. Lewis, Sara K. Rodgers
IEEECIT
2006
IEEE
15 years 7 months ago
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition
— User authentication is still heavily reliant on the use of passwords, and the security problems associated with passwords are becoming more and more serious. The main causes of...
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee,...