Sciweavers

3299 search results - page 526 / 660
» Privacy and Trusted Computing
Sort
View
HUC
2003
Springer
15 years 9 months ago
liquid: Context-Aware Distributed Queries
Abstract. As low-level architectural support for context-aware computing matures, we are ready to explore more general and powerful means of accessing context data. Information req...
Jeffrey Heer, Alan Newberger, Chris Beckmann, Jaso...
HUC
2000
Springer
15 years 7 months ago
Using Handheld Devices in Synchronous Collaborative Scenarios
: In this paper we present a platform specially designed for groupware applications running on handheld devices. Common groupware platforms request desktop computers as underlying ...
Jörg Roth, Claus Unger
BCSHCI
2008
15 years 5 months ago
Ubiquitous healthcare: do we want it?
In this paper we describe the development and test of a futuristic health scenario that allows the seamless exchange of sensitive personal data. The scenario was used to elicit us...
Linda Little, Pamela Briggs
FAST
2003
15 years 5 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
WWW
2004
ACM
16 years 5 months ago
Anti-aliasing on the web
It is increasingly common for users to interact with the web using a number of different aliases. This trend is a doubleedged sword. On one hand, it is a fundamental building bloc...
Jasmine Novak, Prabhakar Raghavan, Andrew Tomkins