Sciweavers

490 search results - page 6 / 98
» Enabling User Control with Personal Identity Management
Sort
View
73
Voted
PERVASIVE
2009
Springer
15 years 5 months ago
Inferring Identity Using Accelerometers in Television Remote Controls
Abstract. We show that accelerometers embedded in a television remote control can be used to distinguish household members based on the unique way each person wields the remote. Th...
Keng-hao Chang, Jeffrey Hightower, Branislav Kveto...
72
Voted
ISCC
2008
IEEE
15 years 4 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...
IFIP11
2004
141views Business» more  IFIP11 2004»
14 years 11 months ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze
89
Voted
ICDE
2010
IEEE
214views Database» more  ICDE 2010»
14 years 10 months ago
The Entity Name System: Enabling the web of entities
— We are currently witnessing an increasing interest in the use of the web as an information and knowledge source. Much of the information sought after in the web is in this case...
Heiko Stoermer, Themis Palpanas, George Giannakopo...
63
Voted
CDC
2008
IEEE
15 years 4 months ago
Enabling bio-feedback using real-time fMRI
— Despite the enormous complexity of the human mind, fMRI techniques are able to partially observe the state of a brain in action. In this paper we describe an experimental setup...
Henrik Ohlsson, Joakim Rydell, Anders Brun, Jacob ...