Sciweavers

2454 search results - page 203 / 491
» Privacy in the Information and Communications Technologies
Sort
View
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
15 years 7 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
BIOWIRE
2007
Springer
15 years 8 months ago
Field-Based Coordination for Pervasive Computing Applications
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli
AIS
2002
Springer
15 years 1 months ago
Knowledge Networking in Cross-Cultural Settings
: Knowledge networking is seen here in terms of creating new alliances of producers, users and mediators of knowledge. At the global level, knowledge networking is about a symbioti...
Karamjit S. Gill
CISS
2010
IEEE
14 years 5 months ago
Transmission coordination for ad hoc networks
— AHNs are wireless networks operating without the benefits of network infrastructure (basestations) or centralized control. AHNs working with limited spectrum perform best when...
Ananth V. Kini, Steven Weber, Fadi A. Aloul, Nagar...
79
Voted
GRAPHICSINTERFACE
2003
15 years 3 months ago
Portrait: Generating Personal Presentations
The rise of email and instant messaging as important tools in the professional workplace has created changes in how we communicate. One such change is that these media tend to red...
James Fogarty, Jodi Forlizzi, Scott E. Hudson