Sciweavers

1226 search results - page 225 / 246
» Secure Mobile Gambling
Sort
View
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
16 years 1 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
16 years 6 days ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen
CHI
2005
ACM
16 years 5 days ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
CHI
2004
ACM
16 years 4 days ago
Pointing without a pointer
We present a method for performing selection tasks based on continuous control of multiple, competing agents who try to determine the user's intentions from their control beh...
John Williamson, Roderick Murray-Smith
ICSE
2007
IEEE-ACM
15 years 12 months ago
A Perspective on the Future of Middleware-based Software Engineering
Middleware is a software layer that stands between the networked operating system and the application and provides well known reusable solutions to frequently encountered problems...
Mauro Caporuscio, Nikolaos Georgantas, Valé...