Sciweavers

490 search results - page 73 / 98
» Enabling User Control with Personal Identity Management
Sort
View
IUI
2003
ACM
15 years 5 months ago
Towards individual service provisioning
With the emergence of modularized componentbased electronic services, such as Web Services and semantically tagged services, Individual Service Provisioning, wherein any user can ...
Fredrik Espinoza
91
Voted
MUM
2009
ACM
190views Multimedia» more  MUM 2009»
15 years 7 months ago
Handy feedback: connecting smart meters with mobile phones
Reducing their energy consumption has become an important objective for many people. Consumption transparency and timely feedback are essential to support those who want to adjust...
Markus Weiss, Friedemann Mattern, Tobias Graml, Th...
IE
2007
15 years 2 months ago
An evaluation framework for videogame based tasking of remote vehicles
Unmanned vehicles (UV’s) are increasingly being employed in civil and military domains often for operations in dangerous environments. Typically these vehicles require some leve...
Adam J. Hassell, Philip Smith, David Stratton
ICDCS
2011
IEEE
14 years 2 days ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 7 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami