default search action
Norman M. Sadeh
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]David Rodríguez Torrado, José M. del Álamo, Celia Fernández-Aller, Norman Sadeh:
Sharing is Not Always Caring: Delving Into Personal Data Transfer Compliance in Android Apps. IEEE Access 12: 5256-5269 (2024) - [j48]David Rodríguez Torrado, Ian Yang, José M. del Álamo, Norman Sadeh:
Large language models: a new approach for privacy policy analysis at scale. Computing 106(12): 3879-3903 (2024) - [c116]Sonu Gupta, Geetika Gopi, Harish Balaji, Ellen Poplavska, Nora O'Toole, Siddhant Arora, Thomas B. Norton, Norman M. Sadeh, Shomir Wilson:
Creation and Analysis of an International Corpus of Privacy Laws. LREC/COLING 2024: 4092-4105 - [c115]David Rodríguez Torrado, Celia Fernández-Aller, José M. del Álamo, Norman Sadeh:
Data Retention Disclosures in the Google Play Store: Opacity Remains the Norm. EuroS&P Workshops 2024: 19-23 - [c114]Shikun Zhang, Lily Klucinec, Kyerra Norton, Norman Sadeh, Lorrie Faith Cranor:
Exploring Expandable-Grid Designs to Make iOS App Privacy Labels More Usable. SOUPS @ USENIX Security Symposium 2024: 139-157 - [c113]Yuanyuan Feng, Abhilasha Ravichander, Yaxing Yao, Shikun Zhang, Rex Chen, Shomir Wilson, Norman Sadeh:
Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants. USENIX Security Symposium 2024 - [i17]Rex Chen, Ruiyi Wang, Norman Sadeh, Fei Fang:
Missing Pieces: How Framing Uncertainty Impacts Longitudinal Trust in AI Decision Aids - A Gig Driver Case Study. CoRR abs/2404.06432 (2024) - [i16]David Rodríguez Torrado, Ian Yang, José M. del Álamo, Norman Sadeh:
Large Language Models: A New Approach for Privacy Policy Analysis at Scale. CoRR abs/2405.20900 (2024) - 2023
- [c112]Akshath Jain, David Rodríguez Torrado, José M. del Álamo, Norman M. Sadeh:
ATLAS: Automatically Detecting Discrepancies Between Privacy Policies and Privacy Labels. EuroS&P Workshops 2023: 94-107 - [c111]David Rodríguez Torrado, Akshath Jain, José M. del Álamo, Norman Sadeh:
Comparing Privacy Label Disclosures of Apps Published in both the App Store and Google Play Stores. EuroS&P Workshops 2023: 150-157 - [c110]Tu Le, Alan Wang, Yaxing Yao, Yuanyuan Feng, Arsalan Heydarian, Norman M. Sadeh, Yuan Tian:
Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States. EuroS&P 2023: 1030-1046 - [c109]Rex Chen, Kathleen M. Carley, Fei Fang, Norman M. Sadeh:
Purpose in the Machine: Do Traffic Simulators Produce Distributionally Equivalent Outcomes for Reinforcement Learning Applications? WSC 2023: 1842-1853 - [i15]Tu Le, Alan Wang, Yaxing Yao, Yuanyuan Feng, Arsalan Heydarian, Norman M. Sadeh, Yuan Tian:
Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States. CoRR abs/2303.04955 (2023) - [i14]Akshath Jain, David Rodríguez Torrado, José M. del Álamo, Norman M. Sadeh:
ATLAS: Automatically Detecting Discrepancies Between Privacy Policies and Privacy Labels. CoRR abs/2306.09247 (2023) - [i13]Yuanyuan Feng, Abhilasha Ravichander, Yaxing Yao, Shikun Zhang, Rex Chen, Shomir Wilson, Norman Sadeh:
Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants. CoRR abs/2310.08687 (2023) - [i12]Rex Chen, Kathleen M. Carley, Fei Fang, Norman M. Sadeh:
Purpose in the Machine: Do Traffic Simulators Produce Distributionally Equivalent Outcomes for Reinforcement Learning Applications? CoRR abs/2311.08429 (2023) - 2022
- [j47]Peter Story, Daniel Smullen, Rex Chen, Yaxing Yao, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh, Florian Schaub:
Increasing Adoption of Tor Browser Using Informational and Planning Nudges. Proc. Priv. Enhancing Technol. 2022(2): 152-183 (2022) - [j46]Shikun Zhang, Yuanyuan Feng, Yaxing Yao, Lorrie Faith Cranor, Norman Sadeh:
How Usable Are iOS App Privacy Labels? Proc. Priv. Enhancing Technol. 2022(4): 204-228 (2022) - [c108]Siddhant Arora, Danish Pruthi, Norman M. Sadeh, William W. Cohen, Zachary C. Lipton, Graham Neubig:
Explain, Edit, and Understand: Rethinking User Study Design for Evaluating Model Explanations. AAAI 2022: 5277-5285 - [c107]Jack Gardner, Yuanyuan Feng, Kayla Reiman, Zhi Lin, Akshath Jain, Norman Sadeh:
Helping Mobile Application Developers Create Accurate Privacy Labels. EuroS&P Workshops 2022: 212-230 - [c106]Shikun Zhang, Yan Shvartzshnaider, Yuanyuan Feng, Helen Nissenbaum, Norman Sadeh:
Stop the Spread: A Contextual Integrity Perspective on the Appropriateness of COVID-19 Vaccination Certificates. FAccT 2022: 1657-1670 - [c105]Norman M. Sadeh:
Why Usability Has Become Privacy's Biggest Challenge and What We Can Do About It. ICISSP 2022: 9 - [c104]Rex Chen, Fei Fang, Norman M. Sadeh:
The Real Deal: A Review of Challenges and Opportunities in Moving Reinforcement Learning-Based Traffic Signal Control Systems Towards Reality. ATT@IJCAI 2022: 14-31 - [c103]Siddhant Arora, Henry Hosseini, Christine Utz, Vinayshekhar Bannihatti Kumar, Tristan Dhellemmes, Abhilasha Ravichander, Peter Story, Jasmine Mangat, Rex Chen, Martin Degeling, Thomas B. Norton, Thomas Hupperich, Shomir Wilson, Norman M. Sadeh:
A Tale of Two Regulatory Regimes: Creation and Analysis of a Bilingual Privacy Policy Corpus. LREC 2022: 5460-5472 - [i11]Shikun Zhang, Yan Shvartzshnaider, Yuanyuan Feng, Helen Nissenbaum, Norman M. Sadeh:
Stop the Spread: A Contextual Integrity Perspective on the Appropriateness of COVID-19 Vaccination Certificates. CoRR abs/2205.09036 (2022) - [i10]Rex Chen, Fei Fang, Norman M. Sadeh:
The Real Deal: A Review of Challenges and Opportunities in Moving Reinforcement Learning-Based Traffic Signal Control Systems Towards Reality. CoRR abs/2206.11996 (2022) - [i9]Sonu Gupta, Ellen Poplavska, Nora O'Toole, Siddhant Arora, Thomas B. Norton, Norman M. Sadeh, Shomir Wilson:
Creation and Analysis of an International Corpus of Privacy Laws. CoRR abs/2206.14169 (2022) - [i8]Yuanyuan Feng, Abhilasha Ravichander, Yaxing Yao, Shikun Zhang, Norman Sadeh:
Exploring and Improving the Accessibility of Data Privacy-related Information for People Who Are Blind or Low-vision. CoRR abs/2208.09959 (2022) - 2021
- [j45]Shikun Zhang, Yuanyuan Feng, Lujo Bauer, Lorrie Faith Cranor, Anupam Das, Norman M. Sadeh:
"Did you know this camera tracks your mood?": Understanding Privacy Expectations and Preferences in the Age of Video Analytics. Proc. Priv. Enhancing Technol. 2021(2): 282-304 (2021) - [j44]Peter Story, Daniel Smullen, Yaxing Yao, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh, Florian Schaub:
Awareness, Adoption, and Misconceptions of Web Privacy Tools. Proc. Priv. Enhancing Technol. 2021(3): 308-333 (2021) - [j43]Daniel Smullen, Yaxing Yao, Yuanyuan Feng, Norman M. Sadeh, Arthur Edelstein, Rebecca Weiss:
Managing Potentially Intrusive Practices in the Browser: A User-Centered Perspective. Proc. Priv. Enhancing Technol. 2021(4): 500-527 (2021) - [c102]Abhilasha Ravichander, Alan W. Black, Thomas B. Norton, Shomir Wilson, Norman M. Sadeh:
Breaking Down Walls of Text: How Can NLP Benefit Consumer Privacy? ACL/IJCNLP (1) 2021: 4125-4140 - [c101]Hana Habib, Yixin Zou, Yaxing Yao, Alessandro Acquisti, Lorrie Faith Cranor, Joel R. Reidenberg, Norman M. Sadeh, Florian Schaub:
Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts. CHI 2021: 63:1-63:25 - [c100]Yuanyuan Feng, Yaxing Yao, Norman M. Sadeh:
A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things. CHI 2021: 64:1-64:16 - [c99]Shikun Zhang, Yuanyuan Feng, Norman M. Sadeh:
Facial Recognition: Understanding Privacy Concerns and Attitudes Across Increasingly Diverse Deployment Scenarios. SOUPS @ USENIX Security Symposium 2021: 243-262 - [c98]Rex Chen, Fei Fang, Thomas B. Norton, Aleecia M. McDonald, Norman M. Sadeh:
Fighting the Fog: Evaluating the Clarity of Privacy Disclosures in the Age of CCPA. WPES@CCS 2021: 73-102 - [i7]Rex Chen, Fei Fang, Thomas B. Norton, Aleecia M. McDonald, Norman M. Sadeh:
Fighting the Fog: Evaluating the Clarity of Privacy Disclosures in the Age of CCPA. CoRR abs/2109.13816 (2021) - [i6]Siddhant Arora, Danish Pruthi, Norman M. Sadeh, William W. Cohen, Zachary C. Lipton, Graham Neubig:
Explain, Edit, and Understand: Rethinking User Study Design for Evaluating Model Explanations. CoRR abs/2112.09669 (2021) - 2020
- [j42]Daniel Smullen, Yuanyuan Feng, Shikun Zhang, Norman M. Sadeh:
The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences. Proc. Priv. Enhancing Technol. 2020(1): 195-215 (2020) - [c97]Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh:
Informing the Design of a Personalized Privacy Assistant for the Internet of Things. CHI 2020: 1-13 - [c96]Hana Habib, Sarah Pearman, Jiamin Wang, Yixin Zou, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh, Florian Schaub:
"It's a scavenger hunt": Usability of Websites' Opt-Out and Data Deletion Choices. CHI 2020: 1-12 - [c95]Ellen Poplavska, Thomas B. Norton, Shomir Wilson, Norman M. Sadeh:
From Prescription to Description: Mapping the GDPR to a Privacy Policy Corpus Annotation Scheme. JURIX 2020: 243-246 - [c94]Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh, Florian Schaub:
From Intent to Action: Nudging Users Towards Secure Mobile Payments. SOUPS @ USENIX Security Symposium 2020: 379-415 - [c93]Vinayshekhar Bannihatti Kumar, Roger Iyengar, Namita Nisal, Yuanyuan Feng, Hana Habib, Peter Story, Sushain Cherivirala, Margaret Hagan, Lorrie Faith Cranor, Shomir Wilson, Florian Schaub, Norman M. Sadeh:
Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text. WWW 2020: 1943-1954 - [i5]Jinghai Rao, Dimitar Dimitrov, Paul Hofmann, Norman M. Sadeh:
A Mixed Initiative Semantic Web Framework for Process Composition. CoRR abs/2006.02168 (2020)
2010 – 2019
- 2019
- [j41]Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel R. Reidenberg, N. Cameron Russell, Norman M. Sadeh:
MAPS: Scaling Privacy Compliance Analysis to a Million Apps. Proc. Priv. Enhancing Technol. 2019(3): 66-86 (2019) - [j40]Shomir Wilson, Florian Schaub, Frederick Liu, Kanthashree Mysore Sathyendra, Daniel Smullen, Sebastian Zimmeck, Rohan Ramanath, Peter Story, Fei Liu, Norman M. Sadeh, Noah A. Smith:
Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations. ACM Trans. Web 13(1): 1:1-1:29 (2019) - [c92]Abhilasha Ravichander, Alan W. Black, Shomir Wilson, Thomas B. Norton, Norman M. Sadeh:
Question Answering for Privacy Policies: Combining Computational and Legal Perspectives. EMNLP/IJCNLP (1) 2019: 4946-4957 - [c91]Shikun Zhang, Florian Schaub, Yuanyuan Feng, Norman M. Sadeh:
"It Only Tells Me How I Slept, Not How to Fix It": Exploring Sleep Behaviors and Opportunities for Sleep Technology. iConference 2019: 754-766 - [c90]Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh, Florian Schaub:
An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites. SOUPS @ USENIX Security Symposium 2019 - [i4]Abhilasha Ravichander, Alan W. Black, Shomir Wilson, Thomas B. Norton, Norman M. Sadeh:
Question Answering for Privacy Policies: Combining Computational and Legal Perspectives. CoRR abs/1911.00841 (2019) - 2018
- [j39]Anupam Das, Martin Degeling, Daniel Smullen, Norman M. Sadeh:
Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice. IEEE Pervasive Comput. 17(3): 35-46 (2018) - [j38]Alessandro Oltramari, Dhivya Piraviperumal, Florian Schaub, Shomir Wilson, Sushain Cherivirala, Thomas B. Norton, N. Cameron Russell, Peter Story, Joel R. Reidenberg, Norman M. Sadeh:
PrivOnto: A semantic framework for the analysis of privacy policies. Semantic Web 9(2): 185-203 (2018) - [j37]Junjue Wang, Brandon Amos, Anupam Das, Padmanabhan Pillai, Norman M. Sadeh, Mahadev Satyanarayanan:
Enabling Live Video Analytics with a Scalable and Privacy-Aware Framework. ACM Trans. Multim. Comput. Commun. Appl. 14(3s): 64:1-64:24 (2018) - [c89]Peter Story, Sebastian Zimmeck, Norman M. Sadeh:
Which Apps Have Privacy Policies? - An Analysis of Over One Million Google Play Store Apps. APF 2018: 3-23 - [c88]Stefan Schiffner, Bettina Berendt, Triin Siil, Martin Degeling, Robert Riemann, Florian Schaub, Kim Wuyts, Massimo Attoresi, Seda F. Gürses, Achim Klabunde, Jules Polonetsky, Norman M. Sadeh, Gabriela Zanfir-Fortuna:
Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: A Transatlantic Initiative. APF 2018: 24-42 - [c87]Aakanksha Naik, Abhilasha Ravichander, Norman M. Sadeh, Carolyn P. Rosé, Graham Neubig:
Stress Test Evaluation for Natural Language Inference. COLING 2018: 2340-2353 - [c86]Abhijith Athreya Mysore Gopinath, Shomir Wilson, Norman M. Sadeh:
Supervised and Unsupervised Methods for Robust Separation of Section Titles and Prose Text in Web Documents. EMNLP 2018: 850-855 - [i3]Fei Liu, Jeffrey Flanigan, Sam Thomson, Norman M. Sadeh, Noah A. Smith:
Toward Abstractive Summarization Using Semantic Representations. CoRR abs/1805.10399 (2018) - [i2]Aakanksha Naik, Abhilasha Ravichander, Norman M. Sadeh, Carolyn P. Rosé, Graham Neubig:
Stress Test Evaluation for Natural Language Inference. CoRR abs/1806.00692 (2018) - 2017
- [j36]Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman M. Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, Shomir Wilson:
Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. ACM Comput. Surv. 50(3): 44:1-44:41 (2017) - [c85]Anupam Das, Martin Degeling, Xiaoyou Wang, Junjue Wang, Norman M. Sadeh, Mahadev Satyanarayanan:
Assisting Users in a World Full of Cameras: A Privacy-Aware Infrastructure for Computer Vision Applications. CVPR Workshops 2017: 1387-1396 - [c84]Kanthashree Mysore Sathyendra, Shomir Wilson, Florian Schaub, Sebastian Zimmeck, Norman M. Sadeh:
Identifying the Provision of Choices in Privacy Policy Text. EMNLP 2017: 2774-2779 - [c83]Primal Pappachan, Martin Degeling, Roberto Yus, Anupam Das, Sruti Bhagavatula, William Melicher, Pardis Emami Naeini, Shikun Zhang, Lujo Bauer, Alfred Kobsa, Sharad Mehrotra, Norman M. Sadeh, Nalini Venkatasubramanian:
Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences. ICDCS Workshops 2017: 193-198 - [c82]Junjue Wang, Brandon Amos, Anupam Das, Padmanabhan Pillai, Norman M. Sadeh, Mahadev Satyanarayanan:
A Scalable and Privacy-Aware IoT Service for Live Video Analytics. MMSys 2017: 38-49 - [c81]Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman M. Sadeh, Steven M. Bellovin, Joel R. Reidenberg:
Automated Analysis of Privacy Requirements for Mobile Apps. NDSS 2017 - [c80]Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, Norman M. Sadeh:
Privacy Expectations and Preferences in an IoT World. SOUPS 2017: 399-412 - 2016
- [j35]Florian Schaub, Travis D. Breaux, Norman M. Sadeh:
Crowdsourcing privacy policy analysis: Potential, challenges and best practices. it Inf. Technol. 58(5): 229-236 (2016) - [c79]Frederick Liu, Shomir Wilson, Florian Schaub, Norman M. Sadeh:
Analyzing Vocabulary Intersections of Expert Annotations and Topic Models for Data Practices in Privacy Policies. AAAI Fall Symposia 2016 - [c78]Kanthashree Mysore Sathyendra, Florian Schaub, Shomir Wilson, Norman M. Sadeh:
Automatic Extraction of Opt-Out Choices from Privacy Policies. AAAI Fall Symposia 2016 - [c77]Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman M. Sadeh, Steven M. Bellovin, Joel R. Reidenberg:
Automated Analysis of Privacy Requirements for Mobile Apps. AAAI Fall Symposia 2016 - [c76]Shomir Wilson, Florian Schaub, Aswarth Abhilash Dara, Frederick Liu, Sushain Cherivirala, Pedro Giovanni Leon, Mads Schaarup Andersen, Sebastian Zimmeck, Kanthashree Mysore Sathyendra, N. Cameron Russell, Thomas B. Norton, Eduard H. Hovy, Joel R. Reidenberg, Norman M. Sadeh:
The Creation and Analysis of a Website Privacy Policy Corpus. ACL (1) 2016 - [c75]Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman M. Sadeh, Yuvraj Agarwal, Alessandro Acquisti:
Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. SOUPS 2016: 27-41 - [c74]Ashwini Rao, Florian Schaub, Norman M. Sadeh, Alessandro Acquisti, Ruogu Kang:
Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online. SOUPS 2016: 77-96 - [c73]Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman M. Sadeh, Lorrie Faith Cranor, Yuvraj Agarwal:
How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices. SOUPS 2016: 321-340 - [c72]Shomir Wilson, Florian Schaub, Rohan Ramanath, Norman M. Sadeh, Fei Liu, Noah A. Smith, Frederick Liu:
Crowdsourcing Annotations for Websites' Privacy Policies: Can It Really Work? WWW 2016: 133-143 - [e6]Toru Ishida, Norman M. Sadeh, Jae Kyu Lee, Federico Casalegno, Wooju Kim, Sohyeong Kim, Sung-Byung Yang:
Proceedings of the 18th Annual International Conference on Electronic Commerce - e-Commerce in Smart connected World, ICEC '16, Suwon, Republic of Korea, August 17-19, 2016. ACM 2016, ISBN 978-1-4503-4222-3 [contents] - 2015
- [c71]Hazim Almuhimedi, Florian Schaub, Norman M. Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, Yuvraj Agarwal:
Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging. CHI 2015: 787-796 - [c70]Manya Sleeper, Alessandro Acquisti, Lorrie Faith Cranor, Patrick Gage Kelley, Sean A. Munson, Norman M. Sadeh:
I Would Like To..., I Shouldn't..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites. CSCW 2015: 1058-1069 - [c69]Fei Liu, Jeffrey Flanigan, Sam Thomson, Norman M. Sadeh, Noah A. Smith:
Toward Abstractive Summarization Using Semantic Representations. HLT-NAACL 2015: 1077-1086 - [i1]Ashwini Rao, Florian Schaub, Norman M. Sadeh:
What do they know about me? Contents and Concerns of Online Behavioral Profiles. CoRR abs/1506.01675 (2015) - 2014
- [c68]Rohan Ramanath, Fei Liu, Norman M. Sadeh, Noah A. Smith:
Unsupervised Alignment of Privacy Policies using Hidden Markov Models. ACL (2) 2014: 605-610 - [c67]Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, Norman M. Sadeh:
A field trial of privacy nudges for facebook. CHI 2014: 2367-2376 - [c66]Justin Cranshaw, Kurt Luther, Patrick Gage Kelley, Norman M. Sadeh:
Curated city: capturing individual city guides through social curation. CHI 2014: 3249-3258 - [c65]Fei Liu, Rohan Ramanath, Norman M. Sadeh, Noah A. Smith:
A Step Towards Usable Privacy Policy: Automatic Alignment of Privacy Statements. COLING 2014: 884-894 - [c64]Rohan Ramanath, Florian Schaub, Shomir Wilson, Fei Liu, Norman M. Sadeh, Noah A. Smith:
Identifying Relevant Text Fragments to Help Crowdsource Privacy Policy Annotations. HCOMP 2014: 54-55 - [c63]Florian Schaub, Travis D. Breaux, Norman M. Sadeh:
Crowdsourcing the Extraction of Data Practices from Privacy Policies. HCOMP 2014: 56-57 - [c62]Jialiu Lin, Bin Liu, Norman M. Sadeh, Jason I. Hong:
Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. SOUPS 2014: 199-212 - [c61]Bin Liu, Jialiu Lin, Norman M. Sadeh:
Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help? WWW 2014: 201-212 - 2013
- [j34]Lorrie Faith Cranor, Norman M. Sadeh:
A Shortage of Privacy Engineers. IEEE Secur. Priv. 11(2): 77-79 (2013) - [j33]Jialiu Lin, Michael Benisch, Norman M. Sadeh, Jianwei Niu, Jason I. Hong, Banghui Lu, Shaohui Guo:
A comparative study of location-sharing privacy preferences in the United States and China. Pers. Ubiquitous Comput. 17(4): 697-711 (2013) - [c60]Manya Sleeper, Justin Cranshaw, Patrick Gage Kelley, Blase Ur, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh:
"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets. CHI 2013: 3277-3286 - [c59]Patrick Gage Kelley, Lorrie Faith Cranor, Norman M. Sadeh:
Privacy as part of the app decision-making process. CHI 2013: 3393-3402 - [c58]Hazim Almuhimedi, Shomir Wilson, Bin Liu, Norman M. Sadeh, Alessandro Acquisti:
Tweets are forever: a large-scale quantitative analysis of deleted tweets. CSCW 2013: 897-908 - [c57]Shomir Wilson, Justin Cranshaw, Norman M. Sadeh, Alessandro Acquisti, Lorrie Faith Cranor, Jay Springfield, Sae Young Jeong, Arun Balasubramanian:
Privacy manipulation and acclimation in a location sharing application. UbiComp 2013: 549-558 - [c56]Arun Balasubramanian, Alan Sussman, Norman M. Sadeh:
Decentralized Preemptive Scheduling Across Heterogeneous Multi-core Grid Resources. JSSPP 2013: 22-41 - [c55]Bin Fu, Jialiu Lin, Lei Li, Christos Faloutsos, Jason I. Hong, Norman M. Sadeh:
Why people hate your app: making sense of user feedback in a mobile app store. KDD 2013: 1276-1284 - 2012
- [c54]Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman M. Sadeh, David Wetherall:
A Conundrum of Permissions: Installing Applications on an Android Smartphone. Financial Cryptography Workshops 2012: 68-79 - [c53]Jialiu Lin, Norman M. Sadeh, Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Joy Zhang:
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. UbiComp 2012: 501-510 - [c52]Justin Cranshaw, Raz Schwartz, Jason I. Hong, Norman M. Sadeh:
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City. ICWSM 2012 - 2011
- [j32]Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh, Lorrie Faith Cranor:
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Pers. Ubiquitous Comput. 15(7): 679-694 (2011) - [c51]Justin Cranshaw, Jonathan Mugan, Norman M. Sadeh:
User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models. AAAI 2011 - [c50]Patrick Gage Kelley, Michael Benisch, Lorrie Faith Cranor, Norman M. Sadeh:
When are users comfortable sharing locations with advertisers? CHI 2011: 2449-2452 - [c49]Vassilis Kostakos, Jayant Venkatanathan, Bernardo Reynolds, Norman M. Sadeh, Eran Toch, Siraj A. Shaikh, Simon L. Jones:
Who's your best friend?: targeted privacy attacks In location-sharing social networks. UbiComp 2011: 177-186 - [c48]Patrick Gage Kelley, Robin Brewer, Yael Mayer, Lorrie Faith Cranor, Norman M. Sadeh:
An Investigation into Facebook Friend Grouping. INTERACT (3) 2011: 216-233 - [c47]Jayant Venkatanathan, Denzil Ferreira, Michael Benisch, Jialiu Lin, Evangelos Karapanos, Vassilis Kostakos, Norman M. Sadeh, Eran Toch:
Improving Users' Consistency When Recalling Location Sharing Preferences. INTERACT (1) 2011: 380-387 - [c46]Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Jialiu Lin, Eran Toch, Norman M. Sadeh:
Caché: caching location-enhanced content to improve user privacy. MobiSys 2011: 197-210 - [c45]Jianwei Niu, Jinkai Guo, Qingsong Cai, Norman M. Sadeh, Shaohui Guo:
Predict and spread: An efficient routing algorithm for opportunistic networking. WCNC 2011: 498-503 - 2010
- [j31]John Collins, Wolfgang Ketter, Norman M. Sadeh:
Pushing the Limits of Rational Agents: The Trading Agent Competition for Supply Chain Management. AI Mag. 31(2): 63-80 (2010) - [j30]Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Maladau Mou, Rahul Raheja, Jialiu Lin, Norman M. Sadeh, Eran Toch:
Caché: caching location-enhanced content to improve user privacy. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(3): 19-21 (2010) - [c44]Eran Toch, Norman M. Sadeh, Jason I. Hong:
Generating default privacy policies for online social networks. CHI Extended Abstracts 2010: 4243-4248 - [c43]Jialiu Lin, Guang Xiang, Jason I. Hong, Norman M. Sadeh:
Modeling people's place naming preferences in location sharing. UbiComp 2010: 75-84 - [c42]Karen P. Tang, Jialiu Lin, Jason I. Hong, Daniel P. Siewiorek, Norman M. Sadeh:
Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. UbiComp 2010: 85-94 - [c41]Justin Cranshaw, Eran Toch, Jason I. Hong, Aniket Kittur, Norman M. Sadeh:
Bridging the gap between physical location and online social networks. UbiComp 2010: 119-128 - [c40]Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, Janice Y. Tsai, Patrick Gage Kelley, James Springfield, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh:
Empirical models of privacy in location sharing. UbiComp 2010: 129-138 - [c39]Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, Jay Springfield, Patrick Gage Kelley, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh:
Locaccino: a privacy-centric location sharing application. UbiComp (Adjunct Papers) 2010: 381-382 - [e5]Wolfgang Ketter, Han La Poutré, Norman M. Sadeh, Onn Shehory, William E. Walsh:
Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis - AAMAS Workshop, AMEC 2008, Estoril, Portugal, May 12-16, 2008, and AAAI Workshop, TADA 2008, Chicago, IL, USA, July 14, 2008, Revised Selected Papers. Lecture Notes in Business Information Processing 44, Springer 2010, ISBN 978-3-642-15236-8 [contents]
2000 – 2009
- 2009
- [j29]Razvan C. Bunescu, Vitor R. Carvalho, Jan Chomicki, Vincent Conitzer, Michael T. Cox, Virginia Dignum, Zachary Dodds, Mark Dredze, David Furcy, Evgeniy Gabrilovich, Mehmet H. Göker, Hans W. Guesgen, Haym Hirsh, Dietmar Jannach, Ulrich Junker, Wolfgang Ketter, Alfred Kobsa, Sven Koenig, Tessa A. Lau, Lundy Lewis, Eric T. Matson, Ted Metzler, Rada Mihalcea, Bamshad Mobasher, Joelle Pineau, Pascal Poupart, Anita Raja, Wheeler Ruml, Norman M. Sadeh, Guy Shani, Daniel G. Shapiro, Sarabjot Singh Anand, Matthew E. Taylor, Kiri Wagstaff, Trey Smith, William E. Walsh, Rong Zhou:
AAAI 2008 Workshop Reports. AI Mag. 30(1): 108-118 (2009) - [j28]John Collins, Norman M. Sadeh:
Guest Editors' introduction to special section: Supply chain trading agent research. Electron. Commer. Res. Appl. 8(2): 61-62 (2009) - [j27]Michael Benisch, Alberto Sardinha, James Andrews, Ramprasad Ravichandran, Norman M. Sadeh:
CMieux: Adaptive strategies for competitive supply chain trading. Electron. Commer. Res. Appl. 8(2): 78-90 (2009) - [j26]Alberto Sardinha, Michael Benisch, Norman M. Sadeh, Ramprasad Ravichandran, Vedran Podobnik, Mihai Stan:
The 2007 procurement challenge: A competition to evaluate mixed procurement strategies. Electron. Commer. Res. Appl. 8(2): 106-114 (2009) - [j25]Jiong Sun, Norman M. Sadeh:
Coordinated selection of procurement bids in finite capacity environments. Electron. Commer. Res. Appl. 8(6): 291-301 (2009) - [j24]Norman M. Sadeh, Jason I. Hong, Lorrie Faith Cranor, Ian Fette, Patrick Gage Kelley, Madhu K. Prabaker, Jinghai Rao:
Understanding and capturing people's privacy policies in a mobile social networking application. Pers. Ubiquitous Comput. 13(6): 401-412 (2009) - [j23]Jinghai Rao, Alberto Sardinha, Norman M. Sadeh:
A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources. J. Web Semant. 7(1): 40-56 (2009) - [c38]Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh:
Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI 2009: 2003-2012 - [c37]Michael Benisch, Norman M. Sadeh, Tuomas Sandholm:
Methodology for Designing Reasonably Expressive Mechanisms with Application to Ad Auctions. IJCAI 2009: 46-52 - [c36]Yi Wang, Jialiu Lin, Murali Annavaram, Quinn Jacobson, Jason I. Hong, Bhaskar Krishnamachari, Norman M. Sadeh:
A framework of energy efficient mobile sensing for automatic user state recognition. MobiSys 2009: 179-192 - [c35]Ramprasad Ravichandran, Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh:
Capturing Social Networking Privacy Preferences: Can Default Policies Help Alleviate Tradeoffs between Expressiveness and User Burden? Privacy Enhancing Technologies 2009: 1-18 - [c34]Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh, Tuomas Sandholm, Janice Y. Tsai, Lorrie Faith Cranor, Paul Hankes Drielsma:
The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing. SOUPS 2009 - [c33]Ramprasad Ravichandran, Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh:
Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden? SOUPS 2009 - [c32]Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cranor, Paul Hankes Drielsma, Jason I. Hong, Patrick Gage Kelley, Norman M. Sadeh, Janice Y. Tsai:
Analyzing use of privacy policy attributes in a location sharing application. SOUPS 2009 - [c31]Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh:
Who's viewed you?: the impact of feedback in a mobile location-sharing application. SOUPS 2009 - [e4]John Collins, Peyman Faratin, Simon Parsons, Juan A. Rodríguez-Aguilar, Norman M. Sadeh, Onn Shehory, Elizabeth Sklar:
Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis, AAMAS 2007 Workshop, AMEC 2007, Honolulu, Hawaii, May 14, 2007, and AAAI 2007 Workshop, TADA 2007, Vancouver, Canada, July 23, 2007, Selected and Revised Papers. Lecture Notes in Business Information Processing 13, Springer 2009, ISBN 978-3-540-88712-6 [contents] - 2008
- [c30]Michael Benisch, Norman M. Sadeh, Tuomas Sandholm:
A Theory of Expressiveness in Mechanisms. AAAI 2008: 17-23 - [c29]Patrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor:
User-controllable learning of security and privacy policies. AISec 2008: 11-18 - 2007
- [j22]Robert J. Kauffman, Jae Kyu Lee, Norman M. Sadeh:
ECRA Volume 6 Number 1. Electron. Commer. Res. Appl. 6(1): 3-5 (2007) - [j21]Norman M. Sadeh:
ECRA Volume 6 Number 2. Electron. Commer. Res. Appl. 6(2): 125 (2007) - [j20]Jae Kyu Lee, Patrick Y. K. Chau, Robert J. Kauffman, Norman M. Sadeh:
Editor's introduction to regular section. Electron. Commer. Res. Appl. 6(2): 183 (2007) - [j19]Patrick Y. K. Chau, Robert J. Kauffman, Norman M. Sadeh, J. Christopher Westland:
ECRA Volume 6, Number 3. Electron. Commer. Res. Appl. 6(3): 233 (2007) - [j18]Patrick Y. K. Chau, Robert J. Kauffman, Norman M. Sadeh, J. Christopher Westland:
ECRA Volume 6, Number 4. Electron. Commer. Res. Appl. 6(4): 365-366 (2007) - [c28]Norman M. Sadeh:
Publishing ecommerce research- or how to maintain quality and diversity. ICEC 2007: 411-412 - [c27]George B. Davis, Michael Benisch, Kathleen M. Carley, Norman M. Sadeh:
Factoring games to isolate strategic interactions. AAMAS 2007: 68 - [c26]James Andrews, Michael Benisch, Alberto Sardinha, Norman M. Sadeh:
Using Information Gain to Analyze and Fine Tune the Performance of Supply Chain Trading Agents. AMEC/TADA 2007: 182-199 - [c25]Alberto Sardinha, Jinghai Rao, Norman M. Sadeh:
Enforcing Context-Sensitive Policies in Collaborative Business Environments. ICDE Workshops 2007: 705-714 - [c24]Jason Cornwell, Ian Fette, Gary Hsieh, Madhu K. Prabaker, Jinghai Rao, Karen P. Tang, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Jason I. Hong, Bruce M. McLaren, Mike Reiter, Norman M. Sadeh:
User-Controllable Security and Privacy for Pervasive Computing. HotMobile 2007: 14-19 - [c23]Ian Fette, Norman M. Sadeh, Anthony Tomasic:
Learning to detect phishing emails. WWW 2007: 649-656 - 2006
- [j17]Norman M. Sadeh, Jae Kyu Lee, Robert J. Kauffman, René W. Wagenaar:
ECRA Vol. 5. No. 1. Electron. Commer. Res. Appl. 5(1) (2006) - [j16]Michael Benisch, Alberto Sardinha, James Andrews, Norman M. Sadeh:
CMieux: adaptive strategies for competitive supply chain trading. SIGecom Exch. 6(1): 1-10 (2006) - [c22]Michael Benisch, James Andrews, Norman M. Sadeh:
Pricing for customers with probabilistic valuations as a continuous knapsack problem. ICEC 2006: 38-46 - [c21]Michael Benisch, Alberto Sardinha, James Andrews, Norman M. Sadeh:
CMieux: adaptive strategies for competitive supply chain trading. ICEC 2006: 47-58 - [c20]Michael Benisch, James Andrews, Norman M. Sadeh:
Adaptive Pricing for Customers with Probabilistic Valuations. TADA/AMEC 2006: 132-148 - [c19]Michael Benisch, Norman M. Sadeh:
Examining DCSP coordination tradeoffs. AAMAS 2006: 1405-1412 - [c18]Raymund J. Lin, Jack Huang, Norman Sadeh-Koniecpol, Benjamin Tsai:
LOGICRUNCHER - A Logistics Planning and Scheduling Decision Support System for Emerging EMS and 3PL Business Practices. ICEIS (2) 2006: 176-181 - [c17]Jinghai Rao, Dimitar Dimitrov, Paul Hofmann, Norman M. Sadeh:
A Mixed Initiative Approach to Semantic Web Service Discovery and Composition: SAP's Guided Procedures Framework. ICWS 2006: 401-410 - [c16]Jinghai Rao, Dimitar Dimitrov, Paul Hofmann, Norman M. Sadeh:
A Mixed Initiative Semantic Web Framework for Process Composition. ISWC 2006: 873-886 - [e3]Han La Poutré, Norman M. Sadeh, Sverker Janson:
Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms - AAMAS 2005 Workshop, AMEC 2005, Utrecht, Netherlands, July 25, 2005, and IJCAI 2005 Workshop, TADA 2005, Edinburgh, UK, August 1, 2005, Selected and Revised Papers. Lecture Notes in Computer Science 3937, Springer 2006, ISBN 978-3-540-46242-2 [contents] - 2005
- [j15]Raghu Arunachalam, Norman M. Sadeh:
The supply chain trading agent competition. Electron. Commer. Res. Appl. 4(1): 66-84 (2005) - [j14]Jae Kyu Lee, Norman M. Sadeh, Christer Carlsson, Robert J. Kauffman:
Introduction of Vol. 4, No. 4. Electron. Commer. Res. Appl. 4(4) (2005) - [j13]Christoph Bussler, Dieter Fensel, Norman M. Sadeh:
Introduction to the Special Section: The Role of Semantic Web Services in Enterprise Application Integration and E-Commerce. Int. J. Electron. Commer. 9(2): 7-10 (2005) - [c15]Norman M. Sadeh, Jinghai Rao:
Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies. AAAI Fall Symposium: Agents and the Semantic Web 2005: 93-102 - [c14]Shih-Chun Chou, Wen-Tai Hsieh, Fabien L. Gandon, Norman M. Sadeh:
Semantic Web Technologies for Context-Aware Museum Tour Guide Applications. AINA 2005: 709-714 - [c13]Jinghai Rao, Norman M. Sadeh:
A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery. RuleML 2005: 56-70 - 2004
- [j12]Oh Byung Kwon, Norman M. Sadeh:
Applying case-based reasoning and multi-agent intelligent system to context-aware comparative shopping. Decis. Support Syst. 37(2): 199-213 (2004) - [j11]Fabien L. Gandon, Norman M. Sadeh:
Semantic web technologies to reconcile privacy and context awareness. J. Web Semant. 1(3): 241-260 (2004) - [c12]Raghu Arunachalam, Norman M. Sadeh:
The 2003 Supply Chain Management Trading Agent Competition. ICEC 2004: 113-120 - [c11]Jiong Sun, Norman M. Sadeh:
Dynamic Procurement Subject to Temporal and Capacity Constraints. HICSS 2004 - [c10]Fabien L. Gandon, Norman M. Sadeh:
Context-awareness, privacy and mobile access: a web semantic and multiagent approach. UbiMob 2004: 123-130 - 2003
- [j10]Norman M. Sadeh, Raghu Arunachalam, Joakim Eriksson, Niclas Finne, Sverker Janson:
TAC-03 - A Supply-Chain Trading Competition. AI Mag. 24(1): 92-94 (2003) - [j9]Norman M. Sadeh, Jae Kyu Lee:
Advances in B2B e-Commerce and E-Supply Chain Management Guest Editors' Introduction. J. Organ. Comput. Electron. Commer. 13(3-4): 163-165 (2003) - [j8]Norman M. Sadeh, David W. Hildum, Dag Kjenstad:
Agent-Based E-Supply Chain Decision Support. J. Organ. Comput. Electron. Commer. 13(3-4): 225-241 (2003) - [c9]Norman M. Sadeh, Jiong Sun:
Multi-attribute supply chain negotiation: coordinating reverse auctions subject to finite capacity considerations. ICEC 2003: 53-60 - [c8]Fabien Gandon, Norman M. Sadeh:
A Semantic E-Wallet to Reconcile Privacy and Context Awareness. ISWC 2003: 385-401 - [c7]Jiong Sun, Norman M. Sadeh:
Dynamic supply chain formation: integrating multi-attribute auctions and finite capacity scheduling. EC 2003: 244-245 - [c6]Norman M. Sadeh, Ting-Chak Chan, Linh Van, Oh Byung Kwon, Kazuaki Takizawa:
A semantic web environment for context-aware m-commerce. EC 2003: 268-269 - [e2]Norman M. Sadeh, Mary Jo Dively, Robert J. Kauffman, Yannis Labrou, Onn Shehory, Rahul Telang, Lorrie Faith Cranor:
Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003. ACM International Conference Proceeding Series 50, ACM 2003, ISBN 1-58113-788-5 [contents] - 2002
- [e1]Julian A. Padget, Onn Shehory, David C. Parkes, Norman M. Sadeh, William E. Walsh:
Agent-Mediated Electronic Commerce IV, Designing Mechanisms and Systems, AAMAS 2002 Workshop on Agent Mediated Electronic Commerce, Bologna, Italy, July 16, 2002, Revised Papers. Lecture Notes in Computer Science 2531, Springer 2002, ISBN 3-540-00327-4 [contents] - 2000
- [j7]Carles Sierra, Michael J. Wooldridge, Norman M. Sadeh:
Agents on the Web: Agent Research and Development in Europe. IEEE Internet Comput. 4(5): 81-83 (2000)
1990 – 1999
- 1997
- [j6]Norman M. Sadeh, Yoichiro Nakakuki, Sam R. Thangiah:
Learning to recognize (un)promising simulated annealing runs: Efficient search procedures for job shop scheduling and vehicle routing. Ann. Oper. Res. 75: 189-208 (1997) - [c5]David W. Hildum, Norman M. Sadeh, Thomas J. Laliberty, John McA'Nulty, Stephen F. Smith, Dag Kjenstad:
Blackboard Agents for Mixed-Initiative Management of Integrated Process-Planning/Production-Scheduling Solutions Across the Supply Chain. AAAI/IAAI 1997: 1000-1005 - 1996
- [j5]Norman M. Sadeh, Mark S. Fox:
Variable and Value Ordering Heuristics for the Job Shop Scheduling Constraint Satisfaction Problem. Artif. Intell. 86(1): 1-41 (1996) - [j4]Norman M. Sadeh, Yoichiro Nakakuki:
Focused simulated annealing search: An application to job shop scheduling. Ann. Oper. Res. 63(1): 77-103 (1996) - 1995
- [j3]Norman M. Sadeh, Katia P. Sycara, Yalin Xiong:
Backtracking Techniques for the Job Shop Scheduling Constraint Satisfaction Problem. Artif. Intell. 76(1-2): 455-480 (1995) - 1994
- [c4]Yoichiro Nakakuki, Norman M. Sadeh:
Increasing The Efficiency of Simulated Annealing Search by Learning to Recognize (Un)Promising Runs. AAAI 1994: 1316-1322 - 1992
- [c3]Yalin Xiong, Norman M. Sadeh, Katia P. Sycara:
Intelligent Backtracking Techniques for Job Shop Scheduling. KR 1992: 14-23 - 1991
- [j2]Katia P. Sycara, Steven P. Roth, Norman M. Sadeh, Mark S. Fox:
Resource Allocation in Distributed Factory Scheduling. IEEE Expert 6(1): 29-40 (1991) - [j1]Katia P. Sycara, Steven P. Roth, Norman M. Sadeh, Mark S. Fox:
Distributed constrained heuristic search. IEEE Trans. Syst. Man Cybern. 21(6): 1446-1461 (1991) - 1990
- [c2]Mark S. Fox, Norman M. Sadeh:
Why is Scheduling Difficult? A CSP Perspective. ECAI 1990: 754-767
1980 – 1989
- 1989
- [c1]Mark S. Fox, Norman M. Sadeh, Can A. Baykan:
Constrained Heuristic Search. IJCAI 1989: 309-315
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint