Sciweavers

2454 search results - page 292 / 491
» Privacy in the Information and Communications Technologies
Sort
View
DAGSTUHL
2003
15 years 3 months ago
Policies: Giving Users Control over Calls
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec
AIS
2010
Springer
15 years 1 months ago
Community networks and the evolution of civic intelligence
Although the intrinsic physicality of human beings has not changed in millennia, the species has managed to profoundly reconstitute the physical and social world it inhabits. Alth...
Douglas Schuler
IH
2005
Springer
15 years 7 months ago
ID Modulation: Embedding Sensor Data in an RFID Timeseries
This paper reports the first use of ID Modulation to embed a bitstream representing sensor information in a standards-compliant Radio Frequency Identification (RFID) channel. Like ...
Joshua R. Smith, Bing Jiang, Sumit Roy, Matthai Ph...
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
15 years 8 months ago
An Assessment Framework for Discovering and Using Patterns in Virtual Project Management
Virtual project management in global organizations is both challenging and important. Being able to identify and apply best practices is an essential skill, as is an understanding...
Deepak Khazanchi, Ilze Zigurs
WIMOB
2007
IEEE
15 years 8 months ago
WLocator: An Indoor Positioning System
— There exists a multitude of location-sensing systems utilizing wireless technology, though varying in cost, coverage and accuracy. In this paper we will introduce WLocator, a s...
Shaun Phillips, Michael Katchabaw, Hanan Lutfiyya