Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Decoding the Privacy Policies of Assistive Technologies
W4A '24: Proceedings of the 21st International Web for All ConferencePages 87–95https://doi.org/10.1145/3677846.3677850As assistive technologies (ATs) have evolved, they have become increasingly connected. However, these increasing connections pose significant privacy challenges, especially when user privacy is described using complex privacy policies. Our study decodes ...
- research-articleNovember 2023
Macaron: A Logic-based Framework for Software Supply Chain Security Assurance
- Behnaz Hassanshahi,
- Trong Nhan Mai,
- Alistair Michael,
- Benjamin Selwyn-Smith,
- Sophie Bates,
- Padmanabhan Krishnan
SCORED '23: Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem DefensesPages 29–37https://doi.org/10.1145/3605770.3625213Many software supply chain attacks exploit the fact that what is in a source code repository may not match the artifact that is actually deployed in one's system. This paper describes a logic-based framework that analyzes a software component and its ...
- rfcAugust 2023
RFC 9445: RADIUS Extensions for DHCP-Configured Services
This document specifies two new Remote Authentication Dial-In User Service (RADIUS) attributes that carry DHCP options. The specification is generic and can be applicable to any service that relies upon DHCP. Both DHCPv4- and DHCPv6-configured services ...
- research-articleNovember 2022
Governance of Autonomous Agents on the Web: Challenges and Opportunities
- Timotheus Kampik,
- Adnane Mansour,
- Olivier Boissier,
- Sabrina Kirrane,
- Julian Padget,
- Terry R. Payne,
- Munindar P. Singh,
- Valentina Tamma,
- Antoine Zimmermann
ACM Transactions on Internet Technology (TOIT), Volume 22, Issue 4Article No.: 104, Pages 1–31https://doi.org/10.1145/3507910The study of autonomous agents has a long history in the Multiagent System and the Semantic Web communities, with applications ranging from automating business processes to personal assistants. More recently, the Web of Things (WoT), which is an extension ...
- research-articleNovember 2022
Policy Transparency: Authorization Logic Meets General Transparency to Prove Software Supply Chain Integrity
SCORED'22: Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem DefensesPages 3–13https://doi.org/10.1145/3560835.3564549Building reliable software is challenging because today's software supply chains are built and secured from tools and individuals from a broad range of organizations with complex trust relationships.In this setting, tracking the origin of each piece of ...
-
- research-articleMay 2022
Driver Surge Pricing
Management Science (MANS), Volume 68, Issue 5Pages 3219–3235https://doi.org/10.1287/mnsc.2021.4058Ride-hailing marketplaces like Uber and Lyft use dynamic pricing, often called surge, to balance the supply of available drivers with the demand for rides. We study driver-side payment mechanisms for such marketplaces, presenting the theoretical ...
- research-articleNovember 2021
What will the transition to a digital economy look like?: exploring future skills, jobs, and policies needed post COVID
CASCON '21: Proceedings of the 31st Annual International Conference on Computer Science and Software EngineeringPages 296–298The adoption of the digital technologies by firms across large components of the Canadian economy has the potential to create significant disruption in the labour market and dramatically impact skill requirements for the labour force. To add to the ...
- research-articleOctober 2021
XR Accessibility Initiatives in Academic Libraries
Proceedings of the Association for Information Science and Technology (PRA2), Volume 58, Issue 1Pages 780–783https://doi.org/10.1002/pra2.560AbstractVirtual reality and other extended reality (XR) technologies are being integrated into academic libraries to support research and teaching in innovative ways; however, new technologies are often adopted without considering disabled users. XR ...
- research-articleSeptember 2020
Technical Note—Data-Based Dynamic Pricing and Inventory Control with Censored Demand and Limited Price Changes
Operations Research (OPRH), Volume 68, Issue 5Pages 1445–1456https://doi.org/10.1287/opre.2020.1993Pricing and inventory replenishment are important operations decisions for firms such as retailers. To make these decisions effectively, a firm needs to know the demand distribution and its dependency on selling price, which is usually estimated using ...
A firm makes pricing and inventory replenishment decisions for a product over T periods to maximize its expected total profit. Demand is random and price sensitive, and unsatisfied demands are lost and unobservable (censored demand). The firm knows the ...
- research-articleMarch 2020
Optimal Pricing in Markets with Nonconvex Costs
Operations Research (OPRH), Volume 68, Issue 2Pages 480–496https://doi.org/10.1287/opre.2019.1900Optimal Pricing in Energy Markets
Motivated by the critical problem of pricing in electricity markets, in “Optimal Pricing in Markets with Nonconvex Costs,” Azizan, Su, Krishnamurthy, and Wierman design a new pricing scheme, called equilibrium-constrained (EC) pricing, for jointly finding ...
We consider a market run by an operator who seeks to satisfy a given consumer demand for a commodity by purchasing the needed amount from a group of competing suppliers with nonconvex cost functions. The operator knows the suppliers’ cost functions and ...
- research-articleFebruary 2020
In and out domains: Playful principles to in-form urban solutions; a dialogue between architects and game scholars
AcademicMindtrek '20: Proceedings of the 23rd International Conference on Academic MindtrekPages 83–91https://doi.org/10.1145/3377290.3377297The implementation of games in architecture and urban planning has a long history since the 1960s and is still a preferential tool to foster public participation and address contemporary spatial - and social - conflicts within the urban fabric. Moreover,...
- research-articleNovember 2019
A Data-Driven Functionally Robust Approach for Simultaneous Pricing and Order Quantity Decisions with Unknown Demand Function
Operations Research (OPRH), Volume 67, Issue 6Pages 1564–1585https://doi.org/10.1287/opre.2019.1849This research considers a retailer’s problem of optimally pricing a product and making order quantity decisions without knowing the function specifying price–demand relationship. We assume that the price is set only once after collecting data, possibly ...
We consider a retailer’s problem of optimally pricing a product and making order quantity decisions without knowing the function specifying price–demand relationship. We assume that the price is set only once after collecting data, possibly from history ...
- research-articleMay 2019
Opportunities, Challenges and Policies: Foreign Literature Teaching and Distance Education in China
ICDEL '19: Proceedings of the 2019 4th International Conference on Distance Education and LearningPages 50–54https://doi.org/10.1145/3338147.3338178To have a study of the role of distance education in foreign literature teaching in China, this paper initially refers to its definition and the related background knowledge, then focuses on the relationship between foreign literature teaching and ...
- research-articleApril 2019
The lord of the shares: combining attribute-based encryption and searchable encryption for flexible data sharing
SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied ComputingPages 146–155https://doi.org/10.1145/3297280.3297297Secure cloud storage is considered one of the most important issues that both businesses and end-users are considering before moving their private data to the cloud. Lately, we have seen some interesting approaches that are based either on the promising ...
- research-articleMarch 2019
Technical Note—Managing Inventory for Firms with Trade Credit and Deficit Penalty
Operations Research (OPRH), Volume 67, Issue 2Pages 468–478https://doi.org/10.1287/opre.2018.1787How does a firm manage inventory when it receives trade credit from its upstream supplier and offers trade credit to its downstream customer? To maximize its end-of-horizon working capital, the firm needs to trade off standard inventory costs and cash-...
This paper considers a firm that periodically orders inventory to satisfy demand in a finite horizon. The firm operates under two-level trade credit—that is, it offers trade credit to its customer while receiving one from its supplier. In addition to ...
- research-articleJanuary 2019
Using Semantic Web technologies and production rules for reasoning on obligations, permissions, and prohibitions1
AI Communications (AICO), Volume 32, Issue 4Pages 319–334https://doi.org/10.3233/AIC-190617Nowadays the studies on the formalization, enforcement, and monitoring of policies and norms is crucial in different fields of research and in numerous applications. ODRL 2.2 (Open Digital Right Language) is a W3C standard policy expression language ...
- research-articleDecember 2018
Hubei University of Science and Technology Achievements Transformation Policy Analysis and Suggestions
ICETM '18: Proceedings of the 2018 International Conference on Education Technology ManagementPages 7–10https://doi.org/10.1145/3300942.3300945The first source as the first productive force, science and technology talents in universities and colleges, the innovation nursery three important juncture, have the responsibility to also have the ability to carry out the transformation of scientific ...
- articleOctober 2018
Procurement Policies for Mobile-Promotion Platforms
Management Science (MANS), Volume 64, Issue 10Pages 4590–4607https://doi.org/10.1287/mnsc.2017.2837Mobile-promotion platforms enable advertisers individual users or businesses to directly launch their personalized mobile advertising campaigns. These platforms contract with advertisers to provide a certain number of impressions on mobile apps in their ...
- research-articleSeptember 2018
Model-driven run-time enforcement of complex role-based access control policies
ASE '18: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software EngineeringPages 248–258https://doi.org/10.1145/3238147.3238167A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several models have been proposed to specify complex RBAC ...
- research-articleJuly 2018
Towards a Policy-Based Distributed Data-Sharing Economy
AAMAS '18: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent SystemsPages 1733–1734Large scale data sharing is important, especially now, with more open societies of components such as Smart Cities and the Smart Homes creating data sharing ecosystems. We propose that access to data and knowledge be controlled through fine-grained, ...