Sciweavers

152 search results - page 27 / 31
» Anonymous k -Show Credentials
Sort
View
SRDS
2010
IEEE
14 years 7 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
178
Voted
GIS
2009
ACM
15 years 10 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
GROUP
2009
ACM
15 years 4 months ago
Two peers are better than one: aggregating peer reviews for computing assignments is surprisingly accurate
Scientiï¬c peer review, open source software development, wikis, and other domains use distributed review to improve quality of created content by providing feedback to the workâ...
Ken Reily, Pam Ludford Finnerty, Loren G. Terveen
SIGCSE
2006
ACM
211views Education» more  SIGCSE 2006»
15 years 3 months ago
Multimodal communication in the classroom: what does it mean for us?
Experimentation has shown that in-class educational technologies, by permitting anonymous, authored participation, can dramatically alter student communications in the classroom. ...
Tamara Denning, William G. Griswold, Beth Simon, M...
SOFTVIS
2006
ACM
15 years 3 months ago
The Clack graphical router: visualizing network software
We present Clack, a graphical environment for teaching students how Internet routers work and other core networking concepts. Clack is a router written as a Java Applet, and route...
Dan Wendlandt, Martin Casado, Paul Tarjan, Nick Mc...