Sciweavers

119 search results - page 17 / 24
» Self Protecting Data for De-perimeterised Information Sharin...
Sort
View
SIGIR
2002
ACM
14 years 9 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
66
Voted
CHI
2008
ACM
15 years 9 months ago
What drives content tagging: the case of photos on Flickr
We examine tagging behavior on Flickr, a public photosharing website. We build on previous qualitative research that exposed a taxonomy of tagging motivations, as well as on socia...
Oded Nov, Mor Naaman, Chen Ye
SPC
2005
Springer
15 years 2 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
DIM
2009
ACM
15 years 4 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
IAJIT
2010
157views more  IAJIT 2010»
14 years 8 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi