Sciweavers

145 search results - page 18 / 29
» How do users think about ubiquitous computing
Sort
View
SIGUCCS
2003
ACM
15 years 9 months ago
Being Sam Malone: customer service on a campus where "Everybody Knows Your Name"
Working on a small campus has many advantages: Familiarity with the majority of faculty and staff, in-depth knowledge of how systems interact, adding the personal touch to each in...
Mark Watts
ACSAC
2004
IEEE
15 years 7 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
CSE
2009
IEEE
15 years 5 months ago
Social Relationship Identification: An Example of Social Query
Every moment, millions of people worldwide are communicating and sharing content online. We express ourselves online to enrich existing relationships and establish new relationship...
Christopher P. Diehl, Jaime Montemayor, Michael Pe...
130
Voted
CSE
2009
IEEE
15 years 10 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
SOUPS
2010
ACM
15 years 8 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash