Sciweavers

13417 search results - page 65 / 2684
» Personal information management
Sort
View
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 4 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
CIKM
2009
Springer
15 years 3 months ago
Blogger-centric contextual advertising
This paper addresses the concept of Blogger-Centric Contextual Advertising, which refers to the assignment of personal ads to any blog page, chosen in according to bloggers' ...
Teng-Kai Fan, Chia-Hui Chang
ECSCW
1997
15 years 1 months ago
Supporting the Flow of Information Through Constellations of Interaction
Abstract: In field studies designed to uncover opportunities for computationallyintensive business applications, we observed an interaction pattern we term "constellations&quo...
Tony Salvador, Sara A. Bly
UIST
2004
ACM
15 years 5 months ago
A toolkit for managing user attention in peripheral displays
Traditionally, computer interfaces have been confined to conventional displays and focused activities. However, as displays become embedded throughout our environment and daily li...
Tara Matthews, Anind K. Dey, Jennifer Mankoff, Sco...
KES
2007
Springer
14 years 11 months ago
KeyGraph-based chance discovery for mobile contents management system
Chance discovery provides a way to find rare but very important events for future decision making. It can be applied to stock market prediction, earthquake alarm, intrusion detect...
Kyung-Joong Kim, Myung-Chul Jung, Sung-Bae Cho