Sciweavers

730 search results - page 98 / 146
» Modeling trust in collaborative information systems
Sort
View
128
Voted
CCS
2008
ACM
15 years 5 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
132
Voted
WISE
2009
Springer
16 years 27 days ago
A Web Recommender System for Recommending, Predicting and Personalizing Music Playlists
In this paper, we present a Web recommender system for recommending, predicting and personalizing music playlists based on a user model. We have developed a hybrid similarity match...
Zeina Chedrawy, Syed Sibte Raza Abidi
ECIR
2010
Springer
15 years 5 months ago
Tripartite Hidden Topic Models for Personalised Tag Suggestion
Abstract. Social tagging systems provide methods for users to categorise resources using their own choice of keywords (or "tags") without being bound to a restrictive set...
Morgan Harvey, Mark Baillie, Ian Ruthven, Mark Jam...
130
Voted
MSWIM
2006
ACM
15 years 9 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda
125
Voted
CHI
2005
ACM
16 years 4 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai