Sciweavers

3130 search results - page 571 / 626
» Collusion without communication
Sort
View
CCS
2005
ACM
15 years 5 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
CIKM
2005
Springer
15 years 5 months ago
Internet scale string attribute publish/subscribe data networks
With this work we aim to make a three-fold contribution. We first address the issue of supporting efficiently queries over string-attributes involving prefix, suffix, containmen...
Ioannis Aekaterinidis, Peter Triantafillou
ICMI
2005
Springer
113views Biometrics» more  ICMI 2005»
15 years 5 months ago
Hapticat: exploration of affective touch
This paper describes the Hapticat , a device we developed to study affect through touch. Though intentionally not highly zoomorphic, the device borrows behaviors from pets and th...
Steve Yohanan, Mavis Chan, Jeremy Hopkins, Haibo S...
MDM
2005
Springer
165views Communications» more  MDM 2005»
15 years 5 months ago
STEP: Self-Tuning Energy-safe Predictors
Data access prediction has been proposed as a mechanism to overcome latency lag, and more recently as a means of conserving energy in mobile systems. We present a fully adaptive p...
James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed...
MIDDLEWARE
2005
Springer
15 years 5 months ago
An aspect-oriented ambient intelligence middleware platform
Currently, the interest in Ambient Intelligence (or AmI) has increased exponentially due to the widespread use of portable devices. Users demand more and more functionality from t...
Lidia Fuentes, Daniel Jiménez