Norman M. Sadeh

According to our database1, Norman M. Sadeh authored at least 128 papers between 1989 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations.
TWEB, 2019

"It Only Tells Me How I Slept, Not How to Fix It": Exploring Sleep Behaviors and Opportunities for Sleep Technology.
Proceedings of the Information in Contemporary Society - 14th International Conference, 2019

2018
Enabling Live Video Analytics with a Scalable and Privacy-Aware Framework.
TOMCCAP, 2018

PrivOnto: A semantic framework for the analysis of privacy policies.
Semantic Web, 2018

Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice.
IEEE Pervasive Computing, 2018

Supervised and Unsupervised Methods for Robust Separation of Section Titles and Prose Text in Web Documents.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

Stress Test Evaluation for Natural Language Inference.
Proceedings of the 27th International Conference on Computational Linguistics, 2018

Which Apps Have Privacy Policies? - An Analysis of Over One Million Google Play Store Apps.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018

Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: A Transatlantic Initiative.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018

2017
Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online.
ACM Comput. Surv., 2017

Privacy Expectations and Preferences in an IoT World.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Automated Analysis of Privacy Requirements for Mobile Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

A Scalable and Privacy-Aware IoT Service for Live Video Analytics.
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017

Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Identifying the Provision of Choices in Privacy Policy Text.
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017

Assisting Users in a World Full of Cameras: A Privacy-Aware Infrastructure for Computer Vision Applications.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

2016
Crowdsourcing privacy policy analysis: Potential, challenges and best practices.
it - Information Technology, 2016

Crowdsourcing Annotations for Websites' Privacy Policies: Can It Really Work?
Proceedings of the 25th International Conference on World Wide Web, 2016

Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

The Creation and Analysis of a Website Privacy Policy Corpus.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

Automated Analysis of Privacy Requirements for Mobile Apps.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

Automatic Extraction of Opt-Out Choices from Privacy Policies.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

Analyzing Vocabulary Intersections of Expert Annotations and Topic Models for Data Practices in Privacy Policies.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

2015
Toward Abstractive Summarization Using Semantic Representations.
Proceedings of the NAACL HLT 2015, The 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, USA, May 31, 2015

I Would Like To..., I Shouldn't..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help?
Proceedings of the 23rd International World Wide Web Conference, 2014

Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Crowdsourcing the Extraction of Data Practices from Privacy Policies.
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014

Identifying Relevant Text Fragments to Help Crowdsource Privacy Policy Annotations.
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014

A Step Towards Usable Privacy Policy: Automatic Alignment of Privacy Statements.
Proceedings of the COLING 2014, 2014

Curated city: capturing individual city guides through social curation.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

A field trial of privacy nudges for facebook.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Unsupervised Alignment of Privacy Policies using Hidden Markov Models.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014

2013
A comparative study of location-sharing privacy preferences in the United States and China.
Personal and Ubiquitous Computing, 2013

A Shortage of Privacy Engineers.
IEEE Security & Privacy, 2013

Why people hate your app: making sense of user feedback in a mobile app store.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Decentralized Preemptive Scheduling Across Heterogeneous Multi-core Grid Resources.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 2013

Privacy manipulation and acclimation in a location sharing application.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Tweets are forever: a large-scale quantitative analysis of deleted tweets.
Proceedings of the Computer Supported Cooperative Work, 2013

"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Privacy as part of the app decision-making process.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

A Conundrum of Permissions: Installing Applications on an Android Smartphone.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs.
Personal and Ubiquitous Computing, 2011

Predict and spread: An efficient routing algorithm for opportunistic networking.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Caché: caching location-enhanced content to improve user privacy.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Improving Users' Consistency When Recalling Location Sharing Preferences.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011

An Investigation into Facebook Friend Grouping.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011

Who's your best friend?: targeted privacy attacks In location-sharing social networks.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

When are users comfortable sharing locations with advertisers?
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2010
Caché: caching location-enhanced content to improve user privacy.
Mobile Computing and Communications Review, 2010

Pushing the Limits of Rational Agents: The Trading Agent Competition for Supply Chain Management.
AI Magazine, 2010

Empirical models of privacy in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Locaccino: a privacy-centric location sharing application.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Modeling people's place naming preferences in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Bridging the gap between physical location and online social networks.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Generating default privacy policies for online social networks.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources.
J. Web Semant., 2009

Understanding and capturing people's privacy policies in a mobile social networking application.
Personal and Ubiquitous Computing, 2009

Coordinated selection of procurement bids in finite capacity environments.
Electronic Commerce Research and Applications, 2009

The 2007 procurement challenge: A competition to evaluate mixed procurement strategies.
Electronic Commerce Research and Applications, 2009

Guest Editors' introduction to special section: Supply chain trading agent research.
Electronic Commerce Research and Applications, 2009

CMieux: Adaptive strategies for competitive supply chain trading.
Electronic Commerce Research and Applications, 2009

AAAI 2008 Workshop Reports.
AI Magazine, 2009

Who's viewed you?: the impact of feedback in a mobile location-sharing application.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Analyzing use of privacy policy attributes in a location sharing application.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden?
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Capturing Social Networking Privacy Preferences: Can Default Policies Help Alleviate Tradeoffs between Expressiveness and User Burden?
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

A framework of energy efficient mobile sensing for automatic user state recognition.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Methodology for Designing Reasonably Expressive Mechanisms with Application to Ad Auctions.
Proceedings of the IJCAI 2009, 2009

Who's viewed you?: the impact of feedback in a mobile location-sharing application.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
User-controllable learning of security and privacy policies.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008

A Theory of Expressiveness in Mechanisms.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

2007
ECRA Volume 6 Number 2.
Electronic Commerce Research and Applications, 2007

Editor's introduction to regular section.
Electronic Commerce Research and Applications, 2007

ECRA Volume 6 Number 1.
Electronic Commerce Research and Applications, 2007

ECRA Volume 6, Number 4.
Electronic Commerce Research and Applications, 2007

ECRA Volume 6, Number 3.
Electronic Commerce Research and Applications, 2007

Learning to detect phishing emails.
Proceedings of the 16th International Conference on World Wide Web, 2007

User-Controllable Security and Privacy for Pervasive Computing.
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007

Enforcing Context-Sensitive Policies in Collaborative Business Environments.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Factoring games to isolate strategic interactions.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

Using Information Gain to Analyze and Fine Tune the Performance of Supply Chain Trading Agents.
Proceedings of the Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis, 2007

Publishing ecommerce research- or how to maintain quality and diversity.
Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007

2006
ECRA Vol. 5. No. 1.
Electronic Commerce Research and Applications, 2006

A Mixed Initiative Semantic Web Framework for Process Composition.
Proceedings of the Semantic Web - ISWC 2006, 5th International Semantic Web Conference, 2006

A Mixed Initiative Approach to Semantic Web Service Discovery and Composition: SAP's Guided Procedures Framework.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Examining DCSP coordination tradeoffs.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Adaptive Pricing for Customers with Probabilistic Valuations.
Proceedings of the Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets, 2006

CMieux: adaptive strategies for competitive supply chain trading.
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006

Pricing for customers with probabilistic valuations as a continuous knapsack problem.
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006

2005
Introduction to the Special Section: The Role of Semantic Web Services in Enterprise Application Integration and E-Commerce.
Int. J. Electronic Commerce, 2005

Introduction of Vol. 4, No. 4.
Electronic Commerce Research and Applications, 2005

The supply chain trading agent competition.
Electronic Commerce Research and Applications, 2005

A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery.
Proceedings of the Rules and Rule Markup Languages for the Semantic Web, 2005

Semantic Web Technologies for Context-Aware Museum Tour Guide Applications.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies.
Proceedings of the Agents and the Semantic Web, 2005

2004
Semantic web technologies to reconcile privacy and context awareness.
J. Web Semant., 2004

Applying case-based reasoning and multi-agent intelligent system to context-aware comparative shopping.
Decision Support Systems, 2004

Context-awareness, privacy and mobile access: a web semantic and multiagent approach.
Proceedings of the Actes des 1ères journées francophones Mobilité et Ubiquité 2004, 2004

Dynamic Procurement Subject to Temporal and Capacity Constraints.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

The 2003 Supply Chain Management Trading Agent Competition.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

2003
Advances in B2B e-Commerce and E-Supply Chain Management Guest Editors' Introduction.
J. Org. Computing and E. Commerce, 2003

Agent-Based E-Supply Chain Decision Support.
J. Org. Computing and E. Commerce, 2003

TAC-03 - A Supply-Chain Trading Competition.
AI Magazine, 2003

Dynamic supply chain formation: integrating multi-attribute auctions and finite capacity scheduling.
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003

A semantic web environment for context-aware m-commerce.
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003

A Semantic E-Wallet to Reconcile Privacy and Context Awareness.
Proceedings of the Semantic Web, 2003

Multi-attribute supply chain negotiation: coordinating reverse auctions subject to finite capacity considerations.
Proceedings of the 5th International Conference on Electronic Commerce, 2003

2000
Agents on the Web: Agent Research and Development in Europe.
IEEE Internet Computing, 2000

1997
Learning to recognize (un)promising simulated annealing runs: Efficient search procedures for job shop scheduling and vehicle routing.
Annals OR, 1997

Blackboard Agents for Mixed-Initiative Management of Integrated Process-Planning/Production-Scheduling Solutions Across the Supply Chain.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

1996
Focused simulated annealing search: An application to job shop scheduling.
Annals OR, 1996

Variable and Value Ordering Heuristics for the Job Shop Scheduling Constraint Satisfaction Problem.
Artif. Intell., 1996

1995
Backtracking Techniques for the Job Shop Scheduling Constraint Satisfaction Problem.
Artif. Intell., 1995

1994
Increasing The Efficiency of Simulated Annealing Search by Learning to Recognize (Un)Promising Runs.
Proceedings of the 12th National Conference on Artificial Intelligence, Seattle, WA, USA, July 31, 1994

1992
Intelligent Backtracking Techniques for Job Shop Scheduling.
Proceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR'92). Cambridge, 1992

1991
Distributed constrained heuristic search.
IEEE Trans. Systems, Man, and Cybernetics, 1991

Resource Allocation in Distributed Factory Scheduling.
IEEE Expert, 1991

1990
Why is Scheduling Difficult? A CSP Perspective.
ECAI, 1990

1989
Constrained Heuristic Search.
Proceedings of the 11th International Joint Conference on Artificial Intelligence. Detroit, 1989


  Loading...