Sciweavers

2454 search results - page 358 / 491
» Privacy in the Information and Communications Technologies
Sort
View
HUC
2003
Springer
15 years 3 months ago
Finding a Place for UbiComp in the Home
The movement of design out of the workplace and into the home brings with it the need to develop new analytic concepts to consider how ubiquitous computing might relate to and supp...
Andy Crabtree, Tom Rodden, Terry Hemmings, Steve B...
JNW
2007
128views more  JNW 2007»
14 years 10 months ago
Store and Forward Applications in Telemedicine for Wireless IP Based Networks
— Telemedicine is the use of telecommunications technology to provide medical information and services. It may be as simple as two health professionals discussing a case over the...
Poondi Srinivasan Pandian, Kadavath Peedikayil Saf...
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 1 months ago
Collective response of human populations to large-scale emergencies
Despite recent advances in uncovering the quantitative features of stationary human activity patterns, many applications, from pandemic prediction to emergency response, require a...
James P. Bagrow, Dashun Wang, Albert-Lászl&...
P2P
2006
IEEE
229views Communications» more  P2P 2006»
15 years 4 months ago
Cost-Aware Processing of Similarity Queries in Structured Overlays
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 4 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp