Sciweavers

2454 search results - page 272 / 491
» Privacy in the Information and Communications Technologies
Sort
View
TEI
2010
ACM
129views Hardware» more  TEI 2010»
15 years 2 months ago
Silent mutations: physical-digital interactions in spaces
Many installations research efforts today explore how to engage participants with embedded digital content and applications in interactive environments. Yet the interactive design...
Claudia Rébola Winegarden, Nicholas Komor, ...
CE
2007
102views more  CE 2007»
15 years 1 months ago
ICT and learning: Lessons from Australian classrooms
Research into Information and Communication Technologies (ICT) in schools is well into its third decade but there is still a pressing need to better understand how computer-based ...
Debra N. A. Hayes
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 2 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
MOBISYS
2007
ACM
16 years 1 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang
SACMAT
2009
ACM
15 years 8 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...