Sciweavers

6631 search results - page 1300 / 1327
» Challenges from Information Extraction to Information Fusion
Sort
View
93
Voted
SOUPS
2009
ACM
15 years 7 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
99
Voted
SOUPS
2009
ACM
15 years 7 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
100
Voted
IPPS
2008
IEEE
15 years 6 months ago
Providing security to the Desktop Data Grid
Volunteer Computing is becoming a new paradigm not only for the Computational Grid, but also for institutions using production-level Data Grids because of the enormous storage pot...
Jesus Luna, Michail Flouris, Manolis Marazakis, An...
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
15 years 6 months ago
Modular Integration Through Aspects: Making Cents of Legacy Systems
Recently, Continua Health Alliance has brought together a powerhouse team, including Cisco, IBM, Motorola and others, for personal telehealth products and services. This team will...
Celina Gibbs, Daniel Lohmann, Chunjian Robin Liu, ...
98
Voted
ECTEL
2007
Springer
15 years 6 months ago
An Interoperability Infrastructure for Distributed Feed Networks
Blogs have the aordance to become an integral part of teaching and learning processes as a vehicle for knowledge management. Open, exible systems integrating blogs provide user-f...
Fridolin Wild, Steinn E. Sigurðarson, Stefan S...
« Prev « First page 1300 / 1327 Last » Next »