Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Norman M. Sadeh
2010 – today
- 2013
[j29]Lorrie Faith Cranor, Norman M. Sadeh: A Shortage of Privacy Engineers. IEEE Security & Privacy 11(2): 77-79 (2013)
[j28]Jialiu Lin, Michael Benisch, Norman M. Sadeh, Jianwei Niu, Jason I. Hong, Banghui Lu, Shaohui Guo: A comparative study of location-sharing privacy preferences in the United States and China. Personal and Ubiquitous Computing 17(4): 697-711 (2013)
[c56]Manya Sleeper, Justin Cranshaw, Patrick Gage Kelley, Blase Ur, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh: "i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets. CHI 2013: 3277-3286
[c55]Patrick Gage Kelley, Lorrie Faith Cranor, Norman M. Sadeh: Privacy as part of the app decision-making process. CHI 2013: 3393-3402
[c54]Hazim Almuhimedi, Shomir Wilson, Bin Liu, Norman M. Sadeh, Alessandro Acquisti: Tweets are forever: a large-scale quantitative analysis of deleted tweets. CSCW 2013: 897-908
[c53]Shomir Wilson, Justin Cranshaw, Norman M. Sadeh, Alessandro Acquisti, Lorrie Faith Cranor, Jay Springfield, Sae Young Jeong, Arun Balasubramanian: Privacy manipulation and acclimation in a location sharing application. UbiComp 2013: 549-558
[c52]Bin Fu, Jialiu Lin, Lei Li, Christos Faloutsos, Jason I. Hong, Norman M. Sadeh: Why people hate your app: making sense of user feedback in a mobile app store. KDD 2013: 1276-1284- 2012
[c51]Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman M. Sadeh, David Wetherall: A Conundrum of Permissions: Installing Applications on an Android Smartphone. Financial Cryptography Workshops 2012: 68-79
[c50]Jialiu Lin, Norman M. Sadeh, Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Joy Zhang: Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. UbiComp 2012: 501-510
[c49]Justin Cranshaw, Raz Schwartz, Jason I. Hong, Norman M. Sadeh: The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City. ICWSM 2012- 2011
[j27]Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh, Lorrie Faith Cranor: Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing 15(7): 679-694 (2011)
[c48]Justin Cranshaw, Jonathan Mugan, Norman M. Sadeh: User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models. AAAI 2011
[c47]Patrick Gage Kelley, Michael Benisch, Lorrie Faith Cranor, Norman M. Sadeh: When are users comfortable sharing locations with advertisers? CHI 2011: 2449-2452
[c46]Vassilis Kostakos, Jayant Venkatanathan, Bernardo Reynolds, Norman M. Sadeh, Eran Toch, Siraj A. Shaikh, Simon Jones: Who's your best friend?: targeted privacy attacks In location-sharing social networks. Ubicomp 2011: 177-186
[c45]Patrick Gage Kelley, Robin Brewer, Yael Mayer, Lorrie Faith Cranor, Norman M. Sadeh: An Investigation into Facebook Friend Grouping. INTERACT (3) 2011: 216-233
[c44]Jayant Venkatanathan, Denzil Ferreira, Michael Benisch, Jialiu Lin, Evangelos Karapanos, Vassilis Kostakos, Norman M. Sadeh, Eran Toch: Improving Users' Consistency When Recalling Location Sharing Preferences. INTERACT (1) 2011: 380-387
[c43]Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Jialiu Lin, Eran Toch, Norman M. Sadeh: Caché: caching location-enhanced content to improve user privacy. MobiSys 2011: 197-210
[c42]Jianwei Niu, Jinkai Guo, Qingsong Cai, Norman M. Sadeh, Shaohui Guo: Predict and spread: An efficient routing algorithm for opportunistic networking. WCNC 2011: 498-503- 2010
[j26]John Collins, Wolfgang Ketter, Norman M. Sadeh: Pushing the Limits of Rational Agents: The Trading Agent Competition for Supply Chain Management. AI Magazine 31(2): 63-80 (2010)
[j25]Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Maladau Mou, Rahul Raheja, Jialiu Lin, Norman M. Sadeh, Eran Toch: Caché: caching location-enhanced content to improve user privacy. Mobile Computing and Communications Review 14(3): 19-21 (2010)
[c41]Eran Toch, Norman M. Sadeh, Jason I. Hong: Generating default privacy policies for online social networks. CHI Extended Abstracts 2010: 4243-4248
[c40]Jialiu Lin, Guang Xiang, Jason I. Hong, Norman M. Sadeh: Modeling people's place naming preferences in location sharing. UbiComp 2010: 75-84
[c39]Karen P. Tang, Jialiu Lin, Jason I. Hong, Daniel P. Siewiorek, Norman M. Sadeh: Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. UbiComp 2010: 85-94
[c38]Justin Cranshaw, Eran Toch, Jason I. Hong, Aniket Kittur, Norman M. Sadeh: Bridging the gap between physical location and online social networks. UbiComp 2010: 119-128
[c37]Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, Janice Y. Tsai, Patrick Gage Kelley, James Springfield, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Empirical models of privacy in location sharing. UbiComp 2010: 129-138
[c36]Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, Jay Springfield, Patrick Gage Kelley, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Locaccino: a privacy-centric location sharing application. UbiComp (Adjunct Papers) 2010: 381-382
2000 – 2009
- 2009
[j24]Razvan C. Bunescu, Vitor R. Carvalho, Jan Chomicki, Vincent Conitzer, Michael T. Cox, Virginia Dignum, Zachary Dodds, Mark Dredze, David Furcy, Evgeniy Gabrilovich, Mehmet H. Göker, Hans W. Guesgen, Haym Hirsh, Dietmar Jannach, Ulrich Junker, Wolfgang Ketter, Alfred Kobsa, Sven Koenig, Tessa A. Lau, Lundy Lewis, Eric T. Matson, Ted Metzler, Rada Mihalcea, Bamshad Mobasher, Joelle Pineau, Pascal Poupart, Anita Raja, Wheeler Ruml, Norman M. Sadeh, Guy Shani, Daniel G. Shapiro, Sarabjot Singh Anand, Matthew E. Taylor, Kiri Wagstaff, Trey Smith, William E. Walsh, Ron Zhou: AAAI 2008 Workshop Reports. AI Magazine 30(1): 108-118 (2009)
[j23]John Collins, Norman M. Sadeh: Guest Editors' introduction to special section: Supply chain trading agent research. Electronic Commerce Research and Applications 8(2): 61-62 (2009)
[j22]Michael Benisch, Alberto Sardinha, James Andrews, Ramprasad Ravichandran, Norman M. Sadeh: CMieux: Adaptive strategies for competitive supply chain trading. Electronic Commerce Research and Applications 8(2): 78-90 (2009)
[j21]Alberto Sardinha, Michael Benisch, Norman M. Sadeh, Ramprasad Ravichandran, Vedran Podobnik, Mihai Stan: The 2007 procurement challenge: A competition to evaluate mixed procurement strategies. Electronic Commerce Research and Applications 8(2): 106-114 (2009)
[j20]Jiong Sun, Norman M. Sadeh: Coordinated selection of procurement bids in finite capacity environments. Electronic Commerce Research and Applications 8(6): 291-301 (2009)
[j19]Norman M. Sadeh, Jason I. Hong, Lorrie Faith Cranor, Ian Fette, Patrick Gage Kelley, Madhu K. Prabaker, Jinghai Rao: Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13(6): 401-412 (2009)
[j18]Jinghai Rao, Alberto Sardinha, Norman M. Sadeh: A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources. J. Web Sem. 7(1): 40-56 (2009)
[c35]Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI 2009: 2003-2012
[c34]Michael Benisch, Norman M. Sadeh, Tuomas Sandholm: Methodology for Designing Reasonably Expressive Mechanisms with Application to Ad Auctions. IJCAI 2009: 46-52
[c33]Yi Wang, Jialiu Lin, Murali Annavaram, Quinn Jacobson, Jason I. Hong, Bhaskar Krishnamachari, Norman M. Sadeh: A framework of energy efficient mobile sensing for automatic user state recognition. MobiSys 2009: 179-192
[c32]Ramprasad Ravichandran, Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh: Capturing Social Networking Privacy Preferences: Can Default Policies Help Alleviate Tradeoffs between Expressiveness and User Burden? Privacy Enhancing Technologies 2009: 1-18
[c31]Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh, Tuomas Sandholm, Janice Y. Tsai, Lorrie Faith Cranor, Paul Hankes Drielsma: The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing. SOUPS 2009
[c30]Ramprasad Ravichandran, Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh: Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden? SOUPS 2009
[c29]Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cranor, Paul Hankes Drielsma, Jason I. Hong, Patrick Gage Kelley, Norman M. Sadeh, Janice Y. Tsai: Analyzing use of privacy policy attributes in a location sharing application. SOUPS 2009
[c28]Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. SOUPS 2009
[e3]John Collins, Peyman Faratin, Simon Parsons, Juan A. Rodríguez-Aguilar, Norman M. Sadeh, Onn Shehory, Elizabeth Sklar (Eds.): Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis, AAMAS 2007 Workshop, AMEC 2007, Honolulu, Hawaii, May 14, 2007, and AAAI 2007 Workshop, TADA 2007, Vancouver, Canada, July 23, 2007, Selected and Revised Papers. Lecture Notes in Business Information Processing 13, Springer 2009, ISBN 978-3-540-88712-6- 2008
[c27]Michael Benisch, Norman M. Sadeh, Tuomas Sandholm: A Theory of Expressiveness in Mechanisms. AAAI 2008: 17-23
[c26]Patrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor: User-controllable learning of security and privacy policies. AISec 2008: 11-18- 2007
[j17]Robert J. Kauffman, Jae Kyu Lee, Norman M. Sadeh: ECRA Volume 6 Number 1. Electronic Commerce Research and Applications 6(1): 3-5 (2007)
[j16]Norman M. Sadeh: ECRA Volume 6 Number 2. Electronic Commerce Research and Applications 6(2): 125 (2007)
[j15]Jae Kyu Lee, Patrick Y. K. Chau, Robert J. Kauffman, Norman M. Sadeh: Editor's introduction to regular section. Electronic Commerce Research and Applications 6(2): 183 (2007)
[j14]Patrick Y. K. Chau, Robert J. Kauffman, Norman M. Sadeh, J. Christopher Westland: ECRA Volume 6, Number 3. Electronic Commerce Research and Applications 6(3): 233 (2007)
[j13]Patrick Y. K. Chau, Robert J. Kauffman, Norman M. Sadeh, J. Christopher Westland: ECRA Volume 6, Number 4. Electronic Commerce Research and Applications 6(4): 365-366 (2007)
[c25]Norman M. Sadeh: Publishing ecommerce research- or how to maintain quality and diversity. ICEC 2007: 411-412
[c24]George B. Davis, Michael Benisch, Kathleen M. Carley, Norman M. Sadeh: Factoring games to isolate strategic interactions. AAMAS 2007: 68
[c23]James Andrews, Michael Benisch, Alberto Sardinha, Norman M. Sadeh: Using Information Gain to Analyze and Fine Tune the Performance of Supply Chain Trading Agents. AMEC/TADA 2007: 182-199
[c22]Alberto Sardinha, Jinghai Rao, Norman M. Sadeh: Enforcing Context-Sensitive Policies in Collaborative Business Environments. ICDE Workshops 2007: 705-714
[c21]- 2006
[j12]Norman M. Sadeh, Jae Kyu Lee, Robert J. Kauffman, René W. Wagenaar: ECRA Vol. 5. No. 1. Electronic Commerce Research and Applications 5(1) (2006)
[j11]Michael Benisch, Alberto Sardinha, James Andrews, Norman M. Sadeh: CMieux: adaptive strategies for competitive supply chain trading. SIGecom Exchanges 6(1): 1-10 (2006)
[c20]Michael Benisch, James Andrews, Norman M. Sadeh: Pricing for customers with probabilistic valuations as a continuous knapsack problem. ICEC 2006: 38-46
[c19]Michael Benisch, Alberto Sardinha, James Andrews, Norman M. Sadeh: CMieux: adaptive strategies for competitive supply chain trading. ICEC 2006: 47-58
[c18]Michael Benisch, James Andrews, Norman M. Sadeh: Adaptive Pricing for Customers with Probabilistic Valuations. TADA/AMEC 2006: 132-148
[c17]
[c16]Jinghai Rao, Dimitar Dimitrov, Paul Hofmann, Norman M. Sadeh: A Mixed Initiative Approach to Semantic Web Service Discovery and Composition: SAP's Guided Procedures Framework. ICWS 2006: 401-410
[c15]Jinghai Rao, Dimitar Dimitrov, Paul Hofmann, Norman M. Sadeh: A Mixed Initiative Semantic Web Framework for Process Composition. International Semantic Web Conference 2006: 873-886- 2005
[j10]Raghu Arunachalam, Norman M. Sadeh: The supply chain trading agent competition. Electronic Commerce Research and Applications 4(1): 66-84 (2005)
[j9]Jae Kyu Lee, Norman M. Sadeh, Christer Carlsson, Robert J. Kauffman: Introduction of Vol. 4, No. 4. Electronic Commerce Research and Applications 4(4) (2005)
[c14]Shih-Chun Chou, Wen-Tai Hsieh, Fabien L. Gandon, Norman M. Sadeh: Semantic Web Technologies for Context-Aware Museum Tour Guide Applications. AINA 2005: 709-714
[c13]Jinghai Rao, Norman M. Sadeh: A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery. RuleML 2005: 56-70- 2004
[j8]Oh Byung Kwon, Norman M. Sadeh: Applying case-based reasoning and multi-agent intelligent system to context-aware comparative shopping. Decision Support Systems 37(2): 199-213 (2004)
[j7]Fabien L. Gandon, Norman M. Sadeh: Semantic web technologies to reconcile privacy and context awareness. J. Web Sem. 1(3): 241-260 (2004)
[c12]Raghu Arunachalam, Norman M. Sadeh: The 2003 Supply Chain Management Trading Agent Competition. ICEC 2004: 113-120
[c11]Jiong Sun, Norman M. Sadeh: Dynamic Procurement Subject to Temporal and Capacity Constraints. HICSS 2004
[c10]Fabien L. Gandon, Norman M. Sadeh: Context-awareness, privacy and mobile access: a web semantic and multiagent approach. UbiMob 2004: 123-130- 2003
[j6]Norman M. Sadeh, Raghu Arunachalam, Joakim Eriksson, Niclas Finne, Sverker Janson: TAC-03 - A Supply-Chain Trading Competition. AI Magazine 24(1): 92-94 (2003)
[c9]
[c8]Fabien Gandon, Norman M. Sadeh: A Semantic E-Wallet to Reconcile Privacy and Context Awareness. International Semantic Web Conference 2003: 385-401
[c7]Jiong Sun, Norman M. Sadeh: Dynamic supply chain formation: integrating multi-attribute auctions and finite capacity scheduling. ACM Conference on Electronic Commerce 2003: 244-245
[c6]Norman M. Sadeh, Ting-Chak Chan, Linh Van, Oh Byung Kwon, Kazuaki Takizawa: A semantic web environment for context-aware m-commerce. ACM Conference on Electronic Commerce 2003: 268-269
[e2]Norman M. Sadeh, Mary Jo Dively, Robert J. Kauffman, Yannis Labrou, Onn Shehory, Rahul Telang, Lorrie Faith Cranor (Eds.): Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003. ACM International Conference Proceeding Series 50, ACM 2003, ISBN 1-58113-788-5- 2002
[e1]Julian A. Padget, Onn Shehory, David C. Parkes, Norman M. Sadeh, William E. Walsh (Eds.): Agent-Mediated Electronic Commerce IV, Designing Mechanisms and Systems, AAMAS 2002 Workshop on Agent Mediated Electronic Commerce, Bologna, Italy, July 16, 2002, Revised Papers. Lecture Notes in Computer Science 2531, Springer 2002, ISBN 3-540-00327-4- 2000
[j5]Carles Sierra, Michael Wooldridge, Norman M. Sadeh: Agents on the Web: Agent Research and Development in Europe. IEEE Internet Computing 4(5): 81-83 (2000)
1990 – 1999
- 1997
[c5]David W. Hildum, Norman M. Sadeh, Thomas J. Laliberty, John McA'Nulty, Stephen F. Smith, Dag Kjenstad: Blackboard Agents for Mixed-Initiative Management of Integrated Process-Planning/Production-Scheduling Solutions Across the Supply Chain. AAAI/IAAI 1997: 1000-1005- 1996
[j4]Norman M. Sadeh, Mark S. Fox: Variable and Value Ordering Heuristics for the Job Shop Scheduling Constraint Satisfaction Problem. Artif. Intell. 86(1): 1-41 (1996)- 1995
[j3]Norman M. Sadeh, Katia P. Sycara, Yalin Xiong: Backtracking Techniques for the Job Shop Scheduling Constraint Satisfaction Problem. Artif. Intell. 76(1-2): 455-480 (1995)- 1994
[c4]Yoichiro Nakakuki, Norman M. Sadeh: Increasing The Efficiency of Simulated Annealing Search by Learning to Recognize (Un)Promising Runs. AAAI 1994: 1316-1322- 1992
[c3]Yalin Xiong, Norman M. Sadeh, Katia P. Sycara: Intelligent Backtracking Techniques for Job Shop Scheduling. KR 1992: 14-23- 1991
[j2]Katia P. Sycara, Steven P. Roth, Norman M. Sadeh, Mark S. Fox: Resource Allocation in Distributed Factory Scheduling. IEEE Expert 6(1): 29-40 (1991)
[j1]Katia P. Sycara, Steven P. Roth, Norman M. Sadeh, Mark S. Fox: Distributed constrained heuristic search. IEEE Transactions on Systems, Man, and Cybernetics 21(6): 1446-1461 (1991)- 1990
[c2]
1980 – 1989
- 1989
[c1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:00 CEST by the dblp team



