Sciweavers

15379 search results - page 231 / 3076
» Protecting users from
Sort
View
FLAIRS
1998
15 years 13 days ago
The Use of Function and Component Hierarchies to Generate User Information
This paper describes a technique which allows impaired functions to be automatically determined from the faulty components and vice versa. Moreover a knowledge base containing the...
Andreas Heinzelmann
124
Voted
WWW
2009
ACM
15 years 11 months ago
Mining interesting locations and travel sequences from GPS trajectories
The increasing availability of GPS-enabled devices is changing the way people interact with the Web, and brings us a large amount of GPS trajectories representing people's lo...
Yu Zheng, Lizhu Zhang, Xing Xie, Wei-Ying Ma
ISW
2005
Springer
15 years 4 months ago
A Privacy Preserving Rental System
Abstract. Rental records contain much sensitive information on individuals, so if abused by the rental service providers, user privacy could be jeopardized. To mitigate this concer...
Yanjiang Yang, Beng Chin Ooi
ACSAC
2000
IEEE
15 years 3 months ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
USENIX
1993
15 years 12 days ago
The Design and Implementation of the Inversion File System
This paper describes the design, implementation, and performance of the Inversion file system. Inversion provides a rich set of services to file system users, and manages a larg...
Michael A. Olson