Year |
Citation |
Score |
2018 |
Wang J, Amos B, Das A, Pillai P, Sadeh N, Satyanarayanan M. Enabling Live Video Analytics with a Scalable and Privacy-Aware Framework Acm Transactions On Multimedia Computing, Communications, and Applications. 14: 1-24. DOI: 10.1145/3209659 |
0.328 |
|
2018 |
Das A, Degeling M, Smullen D, Sadeh N. Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice Ieee Pervasive Computing. 17: 35-46. DOI: 10.1109/Mprv.2018.03367733 |
0.401 |
|
2017 |
Acquisti A, Adjerid I, Balebako R, Brandimarte L, Cranor LF, Komanduri S, Leon PG, Sadeh N, Schaub F, Sleeper M, Wang Y, Wilson S. Nudges for Privacy and Security Acm Computing Surveys. 50: 1-41. DOI: 10.1145/3054926 |
0.33 |
|
2014 |
Reidenberg JR, Breaux T, Cranor LF, French B, Grannis A, Graves JT, Liu F, McDonald AM, Norton TB, Ramanath R, Russell NC, Sadeh N, Schaub F. Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding Berkeley Technology Law Journal. 30: 39. DOI: 10.2139/Ssrn.2418297 |
0.354 |
|
2013 |
Cranor LF, Sadeh N. Privacy engineering emerges as a hot new career Ieee Potentials. 32: 7-9. DOI: 10.1109/Mpot.2013.2277492 |
0.32 |
|
2013 |
Lin J, Benisch M, Sadeh N, Niu J, Hong J, Lu B, Guo S. A comparative study of location-sharing privacy preferences in the United States and China Personal and Ubiquitous Computing. 17: 697-711. DOI: 10.1007/s00779-012-0610-6 |
0.668 |
|
2011 |
Kelley PG, Benisch M, Cranor LF, Sadeh N. When are users comfortable sharing locations with advertisers? Conference On Human Factors in Computing Systems - Proceedings. 2449-2452. DOI: 10.1145/1978942.1979299 |
0.712 |
|
2011 |
Amini S, Lindqvist J, Hong J, Lin J, Toch E, Sadeh N. Caché: Caching location-enhanced content to improve user privacy Mobisys'11 - Compilation Proceedings of the 9th International Conference On Mobile Systems, Applications and Services and Co-Located Workshops. 197-209. DOI: 10.1145/1923641.1923649 |
0.618 |
|
2011 |
Benisch M, Kelley PG, Sadeh N, Cranor LF. Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs Personal and Ubiquitous Computing. 15: 679-694. DOI: 10.1007/s00779-010-0346-0 |
0.71 |
|
2011 |
Venkatanathan J, Ferreira D, Benisch M, Lin J, Karapanos E, Kostakos V, Sadeh N, Toch E. Improving users' consistency when recalling location sharing preferences Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6946: 380-387. DOI: 10.1007/978-3-642-23774-4_31 |
0.708 |
|
2010 |
Tang KP, Lin J, Hong JI, Siewiorek DP, Sadeh N. Rethinking location sharing: Exploring the implications of social-driven vs. purpose-driven location sharing Ubicomp'10 - Proceedings of the 2010 Acm Conference On Ubiquitous Computing. 85-94. DOI: 10.1145/1864349.1864363 |
0.307 |
|
2009 |
Rao J, Sardinha A, Sadeh N. A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources Web Semantics. 7: 40-56. DOI: 10.1016/J.Websem.2007.10.001 |
0.328 |
|
2009 |
Collins J, Sadeh N. Guest Editors' introduction to special section: Supply chain trading agent research Electronic Commerce Research and Applications. 8: 61-62. DOI: 10.1016/J.Elerap.2008.11.003 |
0.349 |
|
2009 |
Benisch M, Sardinha A, Andrews J, Ravichandran R, Sadeh N. CMieux: Adaptive strategies for competitive supply chain trading Electronic Commerce Research and Applications. 8: 78-90. DOI: 10.1016/J.Elerap.2008.09.005 |
0.718 |
|
2009 |
Ravichandran R, Benisch M, Kelley PG, Sadeh NM. Capturing social networking privacy preferences: Can default policies help alleviate tradeoffs between expressiveness and user burden? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 1-18. DOI: 10.1007/978-3-642-03168-7_1 |
0.68 |
|
2009 |
Benisch M, Sadeh N, Sandholm T. Methodology for designing reasonably expressive mechanisms with application to ad auctions Ijcai International Joint Conference On Artificial Intelligence. 46-52. |
0.659 |
|
2008 |
Sardinha A, Benisch M, Sadeh N, Ravichandran R, Podobnik V, Stan M. The 2007 Procurement Challenge: A competition to evaluate mixed procurement strategies Aaai Workshop - Technical Report. 48-56. DOI: 10.1016/J.Elerap.2008.09.002 |
0.702 |
|
2008 |
Andrews J, Benisch M, Sardinha A, Sadeh N. Using information gain to analyze and fine tune the performance of Supply Chain Trading Agents Lecture Notes in Business Information Processing. 13: 182-199. |
0.721 |
|
2008 |
Benisch M, Sadeh N, Sandholm T. A theory of expressiveness in mechanisms Proceedings of the National Conference On Artificial Intelligence. 1: 17-23. |
0.681 |
|
2007 |
Davis GB, Benisch M, Carley KM, Sadeh NM. Factoring games to isolate strategic interactions Proceedings of the International Conference On Autonomous Agents. 443-449. DOI: 10.1145/1329125.1329207 |
0.693 |
|
2007 |
Andrews J, Benisch M, Sardinha A, Sadeh N. What differentiates a winning agent: An information gain based analysis of TAC-SCM Aaai Workshop - Technical Report. 1-10. |
0.716 |
|
2007 |
Benisch M, Andrews J, Sadeh N. Adaptive pricing for customers with probabilistic valuations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4452: 132-148. |
0.702 |
|
2006 |
Benisch M, Sadeh N. Examining DCSP coordination tradeoffs Proceedings of the International Conference On Autonomous Agents. 2006: 1405-1412. DOI: 10.1145/1160633.1160896 |
0.689 |
|
2006 |
Benisch M, Andrews J, Sadeh N. Pricing for customers with probabilistic valuations as a continuous knapsack problem Proceedings of the Acm Conference On Electronic Commerce. 38-46. DOI: 10.1145/1151454.1151475 |
0.7 |
|
2005 |
Arunachalam R, Sadeh NM. The supply chain trading agent competition Electronic Commerce Research and Applications. 4: 66-84. DOI: 10.1016/j.elerap.2004.10.010 |
0.301 |
|
2003 |
Sadeh N, Arunachalam R, Eriksson J, Finne N, Janson S. TAC-03: A supply-chain trading competition Ai Magazine. 24: 92-94. DOI: 10.1609/Aimag.V24I1.1692 |
0.395 |
|
2000 |
Sierra C, Wooldridge M, Sadeh N. Agent research and development in Europe Ieee Internet Computing. 4: 81-83. DOI: 10.1109/4236.877489 |
0.303 |
|
1996 |
Sadeh N, Fox MS. Variable and value ordering heuristics for the job shop scheduling constraint satisfaction problem Artificial Intelligence. 86: 1-41. DOI: 10.1016/0004-3702(95)00098-4 |
0.319 |
|
1995 |
Sadeh N, Sycara K, Xiong Y. Backtracking techniques for the job shop scheduling constraint satisfaction problem Artificial Intelligence. 76: 455-480. DOI: 10.1016/0004-3702(95)00078-S |
0.339 |
|
1991 |
Sycara KP, Roth SF, Sadeh N, Fox MS. Resource Allocation in Distributed Factory Scheduling Ieee Expert-Intelligent Systems and Their Applications. 6: 29-40. DOI: 10.1109/64.73815 |
0.352 |
|
Show low-probability matches. |