Sciweavers

6599 search results - page 1136 / 1320
» Towards a Theory of Information
Sort
View
CHI
2003
ACM
15 years 10 months ago
Cognitive strategies and eye movements for searching hierarchical computer displays
This research investigates the cognitive strategies and eye movements that people use to search for a known item in a hierarchical computer display. Computational cognitive models...
Anthony J. Hornof, Tim Halverson
CHI
2003
ACM
15 years 10 months ago
Unpacking "privacy" for a networked world
Although privacy is broadly recognized as a dominant concern for the development of novel interactive technologies, our ability to reason analytically about privacy in real settin...
Leysia Palen, Paul Dourish
72
Voted
CADE
2003
Springer
15 years 10 months ago
Source-Tracking Unification
We propose a practical path-based framework for deriving and simplifying source-tracking information for term unification in the empty theory. Such a framework is useful for debugg...
Venkatesh Choppella, Christopher T. Haynes
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
15 years 10 months ago
Preservation of proximity privacy in publishing numerical sensitive data
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in anonymized data publication. Such breach occurs when an adversary concludes with hig...
Jiexing Li, Yufei Tao, Xiaokui Xiao
PODS
2006
ACM
116views Database» more  PODS 2006»
15 years 10 months ago
Relational lenses: a language for updatable views
We propose a novel approach to the classical view update problem. The view update problem arises from the fact that modifications to a database view may not correspond uniquely to...
Aaron Bohannon, Benjamin C. Pierce, Jeffrey A. Vau...
« Prev « First page 1136 / 1320 Last » Next »