Sciweavers

3299 search results - page 534 / 660
» Privacy and Trusted Computing
Sort
View
108
Voted
OOPSLA
2004
Springer
15 years 9 months ago
Event-driven programming facilitates learning standard programming concepts
We have designed a CS 1 course that integrates event-driven programming from the very start. In [2] we argued that event-driven programming is simple enough for CS 1 when introduc...
Kim B. Bruce, Andrea Pohoreckyj Danyluk
ECCV
2010
Springer
15 years 8 months ago
Seeing through Obscure Glass
Obscure glass is textured glass designed to separate spaces and “obscure” visibility between the spaces. Such glass is used to provide privacy while still allowing light to fl...
219
Voted
ECAGENTS
2001
Springer
150views ECommerce» more  ECAGENTS 2001»
15 years 8 months ago
Security Issues in M-Commerce: A Usage-Based Taxonomy
Abstract. M–commerce is a new area arising from the marriage of electronic commerce with emerging mobile and pervasive computing technology. The newness of this area—and the ra...
Suresh Chari, Parviz Kermani, Sean W. Smith, Leand...
GI
2001
Springer
15 years 8 months ago
Private Information Retrieval
In e-commerce, the protection of user privacy from a server was not considered feasible until the private information retrieval (PIR) problem was stated recently. A PIR protocol a...
Dmitri Asonov
KIVS
1999
Springer
15 years 8 months ago
Strategies for Minimizing the Average Cost of Paging on the Air Interface
: Location Management of mobile users in a cellular network covers tracking and paging (searching) functionality. In this paper a sequential search strategy is proposed which reduc...
Dogan Kesdogan, Andrei Trofimov, Dirk Trossen