Sciweavers

861 search results - page 122 / 173
» Ranking Privacy Policy
Sort
View
CCS
2008
ACM
15 years 1 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
IJCAI
2003
15 years 1 months ago
Use of Off-line Dynamic Programming for Efficient Image Interpretation
An interpretation system finds the likely mappings from portions of an image to real-world objects. An interpretation policy specifies when to apply which imaging operator, to whi...
Ramana Isukapalli, Russell Greiner
CHI
2006
ACM
16 years 6 days ago
Tensions in designing capture technologies for an evidence-based care community
Evidence-based care is an increasingly popular process for long term diagnosis and monitoring of education and healthcare disabilities. Because this evidence must also be collecte...
Gillian R. Hayes, Gregory D. Abowd
MOBISYS
2003
ACM
15 years 11 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald
CIKM
2009
Springer
15 years 6 months ago
Online anonymity for personalized web services
To receive personalized web services, the user has to provide personal information and preferences, in addition to the query itself, to the web service. However, detailed personal...
Yabo Xu, Ke Wang, Guoliang Yang, Ada Wai-Chee Fu