Sciweavers

849 search results - page 166 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
163
Voted
CN
2004
256views more  CN 2004»
15 years 3 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...
113
Voted
CHI
2006
ACM
16 years 4 months ago
Interweaving mobile games with everyday life
We introduce a location?based game called Feeding Yoshi that provides an example of seamful design, in which key characteristics of its underlying technologies--the coverage and s...
Marek Bell, Matthew Chalmers, Louise Barkhuus, Mal...
136
Voted
PLDI
2009
ACM
15 years 10 months ago
Staged information flow for javascript
Modern websites are powered by JavaScript, a flexible dynamic scripting language that executes in client browsers. A common paradigm in such websites is to include third-party Ja...
Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, Sori...
127
Voted
CSE
2009
IEEE
15 years 10 months ago
All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks
Recent research identifies a growing privacy problem that exists within Online Social Networks (OSNs). Several studies have shown how easily strangers can extract personal data a...
Lerone Banks, Shyhtsun Felix Wu
145
Voted
AMMA
2009
Springer
15 years 10 months ago
Turing Trade: A Hybrid of a Turing Test and a Prediction Market
Abstract. We present Turing Trade, a web-based game that is a hybrid of a Turing test and a prediction market. In this game, there is a mystery conversation partner, the “target,...
Joseph Farfel, Vincent Conitzer