• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 46,202
Next 10 →

Data Security

by Dorothy E. Denning, Peter J. Denning , 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract - Cited by 615 (3 self) - Add to MetaCart
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system

PERSONAL DATA

by Gender Male, Nationality Dutch, Languages English , 1971
"... 2 WORK EXPERIENCE Professor (personal full professorship) at Wageningen University, in the Department of ..."
Abstract - Add to MetaCart
2 WORK EXPERIENCE Professor (personal full professorship) at Wageningen University, in the Department of

k-anonymity: a model for protecting privacy.

by Latanya Sweeney - International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, , 2002
"... Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific guarantees ..."
Abstract - Cited by 1313 (15 self) - Add to MetaCart
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific

Personal Data

by Halis Altun , 2006
"... Thesis: Evaluation of neural learning in a MLP NN for an acoustic-to-articulatory ..."
Abstract - Add to MetaCart
Thesis: Evaluation of neural learning in a MLP NN for an acoustic-to-articulatory

Personal Data

by unknown authors
"... Google is an equal opportunity, affirmative action employer. Qualified applicants are considered without regard to race, color, religion, veteran status, ..."
Abstract - Add to MetaCart
Google is an equal opportunity, affirmative action employer. Qualified applicants are considered without regard to race, color, religion, veteran status,

PERSONAL DATA

by Michael A. Dubson
"... U.S. citizen; born Feb. 13, 1956; married. ..."
Abstract - Add to MetaCart
U.S. citizen; born Feb. 13, 1956; married.

Personal Data

by Genitourinary Pathology Gynecologic Pathology
"... Fellowship Type This application is being made for a fellowship in (please check one): Blood banking/Transfusion medicine Breast pathology ..."
Abstract - Add to MetaCart
Fellowship Type This application is being made for a fellowship in (please check one): Blood banking/Transfusion medicine Breast pathology

Email overload: exploring personal information management of email

by Steve Whittaker, Candace Sidner - CHI 96 CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS , 1996
"... Email is one of the most successful computer applications yet devised. Our empirical data show however, that although email was origirally designed as a communications application, it is now used for additional functions, that it was not designed for, such as task management and personal archiving. ..."
Abstract - Cited by 450 (28 self) - Add to MetaCart
Email is one of the most successful computer applications yet devised. Our empirical data show however, that although email was origirally designed as a communications application, it is now used for additional functions, that it was not designed for, such as task management and personal archiving

Consumers and Their Brands: Developing Relationship Theory

by Susan Fournier - Journal of consumer research , 1998
"... Although the relationship metaphor dominates contemporary marketing thought and practice, surprisingly little empirical work has been conducted on relational phenomena in the consumer products domain, particularly at the level of the brand. In this article, the author: (1) argues for the validity of ..."
Abstract - Cited by 552 (3 self) - Add to MetaCart
of relationships consumers form with brands; and (3) inducts from the data the concept of brand relationship quality, a diagnostic tool for conceptualizing and evaluating relation-ship strength. Three in-depth case studies inform this agenda, their interpretation guided by an integrative review of the literature

MACAW: A Media Access Protocol for Wireless LAN's

by Vaduvur Bharghavan, et al.
"... In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols f ..."
Abstract - Cited by 839 (11 self) - Add to MetaCart
In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols
Next 10 →
Results 1 - 10 of 46,202
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University