Sciweavers

2454 search results - page 145 / 491
» Privacy in the Information and Communications Technologies
Sort
View
114
Voted
GIS
2002
ACM
15 years 1 months ago
Data-gathering strategies for social-behavioural research about participatory geographical information system use
Studies about geographical information systems (GIS) use contribute to geographic information science through critical evaluation of the concepts embedded in GIS tools. Social-beha...
Timothy L. Nyerges, Piotr Jankowski, Christina H. ...
ASSETS
2000
ACM
15 years 6 months ago
A study of blind drawing practice: creating graphical information without the visual channel
Existing drawing tools for blind users give inadequate contextual feedback on the state of the drawing, leaving blind users unable to comprehend and successfully produce graphical...
Hesham M. Kamel, James A. Landay
WWW
2007
ACM
16 years 2 months ago
Development of a semantic web based mobile local search system
This paper describes the development of a semantic web and ontology based local search system that can be used in wireless mobile communication services. Categories and Subject De...
Joo Seong Jeon, Gi Jeong Lee
CCS
2010
ACM
15 years 1 months ago
Predictive black-box mitigation of timing channels
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing mitigator that delays output events so that they contain...
Aslan Askarov, Danfeng Zhang, Andrew C. Myers
CCS
2010
ACM
15 years 1 months ago
Efficient provable data possession for hybrid clouds
Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, we propose a cooperative provable data possession scheme ...
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Ho...