Sciweavers

6982 search results - page 1251 / 1397
» Collaboration
Sort
View
PERCOM
2011
ACM
14 years 7 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
AINA
2011
IEEE
14 years 7 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
CHI
2011
ACM
14 years 7 months ago
Social capital on facebook: differentiating uses and users
Though social network site use is often treated as a monolithic activity, in which all time is equally “social” and its impact the same for all users, we examine how Facebook ...
Moira Burke, Robert Kraut, Cameron Marlow
CHI
2011
ACM
14 years 7 months ago
MemTable: an integrated system for capture and recall of shared histories in group workspaces
This paper presents the design, implementation, and evaluation of an interactive tabletop system that supports co-located meeting capture and asynchronous search and review of pas...
Seth E. Hunter, Pattie Maes, Stacey D. Scott, Henr...
CHI
2011
ACM
14 years 7 months ago
Social and technical challenges in parenting teens' social media use
With millions of teenagers on the Internet, millions of parents are trying to understand what their teens are doing and why. Understanding how technology use impacts teens‘ lear...
Sarita Yardi, Amy Bruckman
« Prev « First page 1251 / 1397 Last » Next »