Norman Sadeh - Publications

Affiliations: 
Carnegie Mellon University, Pittsburgh, PA 
Area:
Computer Science

30 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Wang J, Amos B, Das A, Pillai P, Sadeh N, Satyanarayanan M. Enabling Live Video Analytics with a Scalable and Privacy-Aware Framework Acm Transactions On Multimedia Computing, Communications, and Applications. 14: 1-24. DOI: 10.1145/3209659  0.328
2018 Das A, Degeling M, Smullen D, Sadeh N. Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice Ieee Pervasive Computing. 17: 35-46. DOI: 10.1109/Mprv.2018.03367733  0.401
2017 Acquisti A, Adjerid I, Balebako R, Brandimarte L, Cranor LF, Komanduri S, Leon PG, Sadeh N, Schaub F, Sleeper M, Wang Y, Wilson S. Nudges for Privacy and Security Acm Computing Surveys. 50: 1-41. DOI: 10.1145/3054926  0.33
2014 Reidenberg JR, Breaux T, Cranor LF, French B, Grannis A, Graves JT, Liu F, McDonald AM, Norton TB, Ramanath R, Russell NC, Sadeh N, Schaub F. Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding Berkeley Technology Law Journal. 30: 39. DOI: 10.2139/Ssrn.2418297  0.354
2013 Cranor LF, Sadeh N. Privacy engineering emerges as a hot new career Ieee Potentials. 32: 7-9. DOI: 10.1109/Mpot.2013.2277492  0.32
2013 Lin J, Benisch M, Sadeh N, Niu J, Hong J, Lu B, Guo S. A comparative study of location-sharing privacy preferences in the United States and China Personal and Ubiquitous Computing. 17: 697-711. DOI: 10.1007/s00779-012-0610-6  0.668
2011 Kelley PG, Benisch M, Cranor LF, Sadeh N. When are users comfortable sharing locations with advertisers? Conference On Human Factors in Computing Systems - Proceedings. 2449-2452. DOI: 10.1145/1978942.1979299  0.712
2011 Amini S, Lindqvist J, Hong J, Lin J, Toch E, Sadeh N. Caché: Caching location-enhanced content to improve user privacy Mobisys'11 - Compilation Proceedings of the 9th International Conference On Mobile Systems, Applications and Services and Co-Located Workshops. 197-209. DOI: 10.1145/1923641.1923649  0.618
2011 Benisch M, Kelley PG, Sadeh N, Cranor LF. Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs Personal and Ubiquitous Computing. 15: 679-694. DOI: 10.1007/s00779-010-0346-0  0.71
2011 Venkatanathan J, Ferreira D, Benisch M, Lin J, Karapanos E, Kostakos V, Sadeh N, Toch E. Improving users' consistency when recalling location sharing preferences Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6946: 380-387. DOI: 10.1007/978-3-642-23774-4_31  0.708
2010 Tang KP, Lin J, Hong JI, Siewiorek DP, Sadeh N. Rethinking location sharing: Exploring the implications of social-driven vs. purpose-driven location sharing Ubicomp'10 - Proceedings of the 2010 Acm Conference On Ubiquitous Computing. 85-94. DOI: 10.1145/1864349.1864363  0.307
2009 Rao J, Sardinha A, Sadeh N. A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources Web Semantics. 7: 40-56. DOI: 10.1016/J.Websem.2007.10.001  0.328
2009 Collins J, Sadeh N. Guest Editors' introduction to special section: Supply chain trading agent research Electronic Commerce Research and Applications. 8: 61-62. DOI: 10.1016/J.Elerap.2008.11.003  0.349
2009 Benisch M, Sardinha A, Andrews J, Ravichandran R, Sadeh N. CMieux: Adaptive strategies for competitive supply chain trading Electronic Commerce Research and Applications. 8: 78-90. DOI: 10.1016/J.Elerap.2008.09.005  0.718
2009 Ravichandran R, Benisch M, Kelley PG, Sadeh NM. Capturing social networking privacy preferences: Can default policies help alleviate tradeoffs between expressiveness and user burden? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 1-18. DOI: 10.1007/978-3-642-03168-7_1  0.68
2009 Benisch M, Sadeh N, Sandholm T. Methodology for designing reasonably expressive mechanisms with application to ad auctions Ijcai International Joint Conference On Artificial Intelligence. 46-52.  0.659
2008 Sardinha A, Benisch M, Sadeh N, Ravichandran R, Podobnik V, Stan M. The 2007 Procurement Challenge: A competition to evaluate mixed procurement strategies Aaai Workshop - Technical Report. 48-56. DOI: 10.1016/J.Elerap.2008.09.002  0.702
2008 Andrews J, Benisch M, Sardinha A, Sadeh N. Using information gain to analyze and fine tune the performance of Supply Chain Trading Agents Lecture Notes in Business Information Processing. 13: 182-199.  0.721
2008 Benisch M, Sadeh N, Sandholm T. A theory of expressiveness in mechanisms Proceedings of the National Conference On Artificial Intelligence. 1: 17-23.  0.681
2007 Davis GB, Benisch M, Carley KM, Sadeh NM. Factoring games to isolate strategic interactions Proceedings of the International Conference On Autonomous Agents. 443-449. DOI: 10.1145/1329125.1329207  0.693
2007 Andrews J, Benisch M, Sardinha A, Sadeh N. What differentiates a winning agent: An information gain based analysis of TAC-SCM Aaai Workshop - Technical Report. 1-10.  0.716
2007 Benisch M, Andrews J, Sadeh N. Adaptive pricing for customers with probabilistic valuations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4452: 132-148.  0.702
2006 Benisch M, Sadeh N. Examining DCSP coordination tradeoffs Proceedings of the International Conference On Autonomous Agents. 2006: 1405-1412. DOI: 10.1145/1160633.1160896  0.689
2006 Benisch M, Andrews J, Sadeh N. Pricing for customers with probabilistic valuations as a continuous knapsack problem Proceedings of the Acm Conference On Electronic Commerce. 38-46. DOI: 10.1145/1151454.1151475  0.7
2005 Arunachalam R, Sadeh NM. The supply chain trading agent competition Electronic Commerce Research and Applications. 4: 66-84. DOI: 10.1016/j.elerap.2004.10.010  0.301
2003 Sadeh N, Arunachalam R, Eriksson J, Finne N, Janson S. TAC-03: A supply-chain trading competition Ai Magazine. 24: 92-94. DOI: 10.1609/Aimag.V24I1.1692  0.395
2000 Sierra C, Wooldridge M, Sadeh N. Agent research and development in Europe Ieee Internet Computing. 4: 81-83. DOI: 10.1109/4236.877489  0.303
1996 Sadeh N, Fox MS. Variable and value ordering heuristics for the job shop scheduling constraint satisfaction problem Artificial Intelligence. 86: 1-41. DOI: 10.1016/0004-3702(95)00098-4  0.319
1995 Sadeh N, Sycara K, Xiong Y. Backtracking techniques for the job shop scheduling constraint satisfaction problem Artificial Intelligence. 76: 455-480. DOI: 10.1016/0004-3702(95)00078-S  0.339
1991 Sycara KP, Roth SF, Sadeh N, Fox MS. Resource Allocation in Distributed Factory Scheduling Ieee Expert-Intelligent Systems and Their Applications. 6: 29-40. DOI: 10.1109/64.73815  0.352
Show low-probability matches.