Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
This paper addresses Named Entity Mining (NEM), in which we mine knowledge about named entities such as movies, games, and books from a huge amount of data. NEM is potentially use...
Trust has a considerable research tradition in the CHI community. It has been investigated in the context of e-commerce, virtual teams, online gaming, social networking ? to name ...
Item-oriented Web sites maintain repositories of information about things such as books, games, or products. Many of these Web sites offer discussion forums. However, these forums...
Sara Drenner, F. Maxwell Harper, Dan Frankowski, J...
There is an asymmetry in many tangible interfaces: while phicons can be used to manipulate digital information, the reverse is often not possible ? the digital world cannot push b...