Sciweavers

2454 search results - page 231 / 491
» Privacy in the Information and Communications Technologies
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 1 months ago
Instrumented Collective Learning Situations (ICLS): the Gap between Theoretical Research and Observed Practices
: According to socio-constructivism approach, collective situations are promoted to favor learning in classroom, at a distance or in a blended educational context. So, many Informa...
Christine Michel, Élise Garrot, Séba...
ROBOCOMM
2007
IEEE
15 years 8 months ago
Autonomous navigation of wireless robot swarms with covert leaders
— The integration of advanced computation, wireless communication, and control technologies has facilitated the creation of autonomous robot swarms for many civil and military ap...
Xiaofeng Han, Louis F. Rossi, Chien-Chung Shen
134
Voted
CCS
2007
ACM
15 years 8 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
GIS
2006
ACM
15 years 1 months ago
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desir...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu
ADAPTIVE
2007
Springer
15 years 8 months ago
Adaptive Support for Distributed Collaboration
Abstract. Through interaction with others, a person develops multiple perspectives that become the basis for innovation and the construction of new knowledge. This chapter discusse...
Amy Soller