Sciweavers

490 search results - page 80 / 98
» Enabling User Control with Personal Identity Management
Sort
View
146
Voted
ACHI
2010
IEEE
15 years 7 months ago
A Simulation Framework for Human-Robot Interaction
Abstract—The development of human-robot interaction scenarios is a strongly situation-dependent as well as an extremely dynamic task. Humans interacting with the robot directly r...
Norbert Schmitz, Jochen Hirth, Karsten Berns
88
Voted
CHI
2005
ACM
16 years 25 days ago
Toward wearable social networking with iBand
The iBand is a wearable bracelet-like device that exchanges information about its users and their relationships. This exchange happens during the common gesture of the handshake, ...
Marije Kanis, Niall Winters, Stefan Agamanolis, An...
112
Voted
TWC
2008
154views more  TWC 2008»
15 years 9 days ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
90
Voted
MOBISYS
2008
ACM
16 years 1 days ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
90
Voted
CIKM
2009
Springer
15 years 7 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...