Sciweavers

8655 search results - page 294 / 1731
» Challenges for Trusted Computing
Sort
View
COMPSAC
2009
IEEE
15 years 8 months ago
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems
—Countless challenges to preserving a user’s location privacy exist and have become more important than ever before with the proliferation of handheld devices and the pervasive...
Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Shar...
139
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel
147
Voted
ACNS
2008
Springer
96views Cryptology» more  ACNS 2008»
15 years 5 months ago
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
Abstract. "Pairing" is referred to as the operation of achieving authenticated key agreement between two human-operated devices over a short- or medium-range wireless com...
Ramnath Prasad, Nitesh Saxena
119
Voted
HCI
2007
15 years 4 months ago
Augmenting Cognition: Reviewing the Symbiotic Relation Between Man and Machine
Abstract. One of the goals of augmented cognition is creation of adaptive human-machine collaboration that continually optimizes performance of the human-machine system. Augmented ...
Tjerk de Greef, Kees van Dongen, Marc Grootjen, Ja...
DEBU
2008
165views more  DEBU 2008»
15 years 3 months ago
A Survey of Attack-Resistant Collaborative Filtering Algorithms
With the increasing popularity of recommender systems in commercial services, the quality of recommendations has increasingly become an important to study, much like the quality o...
Bhaskar Mehta, Thomas Hofmann