Sciweavers

358 search results - page 62 / 72
» Preserving Privacy in Awareness Systems
Sort
View
SYNTHESE
2008
69views more  SYNTHESE 2008»
14 years 9 months ago
Dispositional implementation solves the superfluous structure problem
Abstract. Consciousness supervenes on activity; computation supervenes on structure. Because of this, some argue, conscious states cannot supervene on computational ones. If true, ...
Colin Klein
CHI
2007
ACM
15 years 10 months ago
Enhancing ubiquitous computing with user interpretation: field testing the home health horoscope
Domestic ubiquitous computing systems often rely on inferences about activities in the home, but the open-ended, dynamic and heterogeneous nature of the home poses serious problem...
William W. Gaver, Phoebe Sengers, Tobie Kerridge, ...
76
Voted
INFOCOM
2008
IEEE
15 years 4 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang
117
Voted
WIMOB
2008
IEEE
15 years 4 months ago
VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking
—Recently, mobile social software has become an active area of research and development. A multitude of systems have been proposed over the past years that try to follow the succ...
Marco von Arb, Matthias Bader, Michael Kuhn 0002, ...
TDSC
2011
14 years 4 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...