Sciweavers

1402 search results - page 166 / 281
» Personalized privacy preservation
Sort
View
CCS
2011
ACM
14 years 19 days ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
110
Voted
AGENTS
1997
Springer
15 years 4 months ago
A Methodology for Building Believable Social Agents
Believable agents are defined to be interactive versions of quality characters in traditional artistic media like film. Such agents are useful in applications such as interactive ...
W. Scott Neal Reilly
91
Voted
IEEESCC
2009
IEEE
15 years 7 months ago
JabberWocky: Crowd-Sourcing Metadata for Files
Finding relevant files in a personal file system continues to be a challenge. It is still easier to find stuff on the Web with its exponential growth than in one’s personal ...
Varun Bhagwan, Carlos Maltzahn
STOC
2009
ACM
112views Algorithms» more  STOC 2009»
16 years 1 months ago
A new approach to auctions and resilient mechanism design
We put forward a new approach to mechanism design, and exemplify it via a new mechanism guaranteeing significant revenue in unrestricted combinatorial auctions. Our mechanism ? su...
Jing Chen, Silvio Micali
105
Voted
ER
2004
Springer
103views Database» more  ER 2004»
15 years 6 months ago
WebDG - A Platform for E-Government Web Services
Abstract. Web services are deemed as the natural choice for deploying e-government applications. Their use enables e-government to fully get advantage of the envisioned Semantic We...
Athman Bouguettaya, Brahim Medjahed, Abdelmounaam ...