Sciweavers

3299 search results - page 177 / 660
» Privacy and Trusted Computing
Sort
View
CHI
2009
ACM
16 years 5 months ago
Research ethics in the facebook era: privacy, anonymity, and oversight
Nathan Bos, Karrie Karahalios, Marcela Musgrove-Ch...
ICCS
2009
Springer
15 years 11 months ago
Experience with Approximations in the Trust-Region Parallel Direct Search Algorithm
Recent years have seen growth in the number of algorithms designed to solve challenging simulation-based nonlinear optimization problems. One such algorithm is the Trust-Region Par...
S. M. Shontz, V. E. Howle, P. D. Hough
PERCOM
2007
ACM
16 years 4 months ago
Privacy Protection in Dynamic Systems Based on RFID Tags
Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski
GLOBECOM
2006
IEEE
15 years 11 months ago
On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies
Abstract— For many evolving application scenarios like ubiquitous and autonomic computing systems, trustworthy computing solutions are essential. However the fact that the autono...
Mahalingam Ramkumar