Sciweavers

435 search results - page 59 / 87
» Mining Frequency Pattern from Mobile Users
Sort
View
122
Voted
SOUPS
2009
ACM
15 years 10 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
129
Voted
CSE
2009
IEEE
15 years 10 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
RSFDGRC
2005
Springer
15 years 9 months ago
Intelligent Algorithms for Optical Track Audio Restoration
Abstract. The Unpredictability Measure computation algorithm applied to psychoacoustic model-based broadband noise attenuation is discussed. A learning decision algorithm based on ...
Andrzej Czyzewski, Marek Dziubinski, Lukasz Litwic...
144
Voted
TON
2012
13 years 6 months ago
Taming the Mobile Data Deluge With Drop Zones
—Human communication has changed by the advent of smartphones. Using commonplace mobile device features they started uploading large amounts of content that increases. This incre...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
153
Voted
ACMICEC
2004
ACM
205views ECommerce» more  ACMICEC 2004»
15 years 9 months ago
M-Modeler: a framework implementation for modeling m-commerce applications
At the present time, the use of mobile technology in business, is becoming an opportunity to generate competitive advantages within organization environments. Mobile technology he...
Ana Hilda Morales-Aranda, Oscar Mayora-Ibarra, San...