Sciweavers

14 search results - page 2 / 3
» Privacy risk models for designing privacy-sensitive ubiquito...
Sort
View
123
Voted
SIGIR
2002
ACM
15 years 22 days ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
PERCOM
2009
ACM
15 years 8 months ago
Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments
—Ensuring spontaneous ad hoc interoperation in decentralized ubiquitous computing environments is challenging, because of heterogeneous resources and divergent policies. Centrali...
Venkatraman Ramakrishna, Peter L. Reiher, Leonard ...
116
Voted
LOCWEB
2009
ACM
15 years 7 months ago
Binding privacy rules to location on the web
As a tool for mitigating the potential privacy risks of gathering and transmitting location information on the Web, we suggest in this paper a model for conveying location informa...
Alissa Cooper, John Morris
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 3 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
101
Voted
CHI
2009
ACM
15 years 5 months ago
Stress outsourced: a haptic social network via crowdsourcing
Stress OutSourced (SOS) is a peer-to-peer network that allows anonymous users to send each other therapeutic massages to relieve stress. By applying the emerging concept of crowds...
Keywon Chung, Carnaven Chiu, Xiao Xiao, Pei-Yu (Pe...