Sciweavers

23 search results - page 3 / 5
» pet 2005
Sort
View
PET
2005
Springer
13 years 11 months ago
Failures in a Hybrid Content Blocking System
Abstract. Three main methods of content blocking are used on the Internet: blocking routes to particular IP addresses, blocking specific URLs in a proxy cache or firewall, and pr...
Richard Clayton
PET
2005
Springer
13 years 11 months ago
Privacy in India: Attitudes and Awareness
Abstract. In recent years, numerous surveys have been conducted to assess attitudes about privacy in the United States, Australia, Canada, and the European Union. Very little infor...
Ponnurangam Kumaraguru, Lorrie Faith Cranor
PET
2005
Springer
13 years 11 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey
MLDM
2005
Springer
13 years 11 months ago
Activity and Motion Detection Based on Measuring Texture Change
We estimate the speed of texture change by measuring the spread of texture vectors in their feature space. This method allows us to robustly detect even very slow moving objects. B...
Longin Jan Latecki, Roland Miezianko, Dragoljub Po...
CAISE
2005
Springer
13 years 11 months ago
A Method and Tool for Business-IT Alignment in Enterprise Architecture
Enterprise architects seek to align enterprise processes and structure with their supporting IT systems so that enterprises can flourish in their environment. The enterprise archi...
Alain Wegmann, Pavel Balabko, Lam-Son Lê, Gi...