Sciweavers

5450 search results - page 15 / 1090
» Personalization of tagging systems
Sort
View
SOUPS
2009
ACM
15 years 8 months ago
Treat 'em like other devices: user authentication of multiple personal RFID tags
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris
144
Voted
HCI
2009
14 years 11 months ago
Social Adaptation of ERP Software: Tagging UI Elements
Abstract. In this paper we present a newly designed annotation and collaboration component, which has been prototypically implemented on top of an ERP (Enterprise Resource Planning...
Marcus Nitsche, Martin Christof Kindsmüller, ...
97
Voted
LOCA
2007
Springer
15 years 8 months ago
LifeTag: WiFi-Based Continuous Location Logging for Life Pattern Analysis
Continuous logging of a person’s geographical position is required for various “life-log” applications, such as memory aids, automatic blog generation, and life pattern analy...
Jun Rekimoto, Takashi Miyaki, Takaaki Ishizawa
JCDL
2006
ACM
151views Education» more  JCDL 2006»
15 years 7 months ago
Tagging of name records for genealogical data browsing
In this paper we present a method of parsing unstructured textual records briefly describing a person and their direct relatives, which we use in the construction of a browsing t...
Mike Perrow, David Barber
UCS
2007
Springer
15 years 8 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti