Sciweavers

2656 search results - page 80 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 9 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
AAAI
2011
13 years 12 months ago
User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models
With smart-phones becoming increasingly commonplace, there has been a subsequent surge in applications that continuously track the location of users. However, serious privacy conc...
Justin Cranshaw, Jonathan Mugan, Norman M. Sadeh
WWW
2009
ACM
16 years 17 days ago
Retaining personal expression for social search
Web is being extensively used for personal expression, which includes ratings, reviews, recommendations, blogs. This user created content, e.g. book review on Amazon.com, becomes ...
Praphul Chandra, Ajay Gupta
MASS
2010
248views Communications» more  MASS 2010»
14 years 9 months ago
Adaptive exploitation of cooperative relay for high performance communications in MIMO ad hoc networks
With the popularity of wireless devices and the increase of computing and storage resources, there are increasing interests in supporting mobile computing techniques. Particularly...
Shan Chu, Xin Wang
HAPTICS
2005
IEEE
15 years 5 months ago
FootIO -- Design and Evaluation of a Device to Enable Foot Interaction over a Computer Network
The development of a device that enables haptic foot interaction for communication over a network is presented. Considering the physical properties of feet we demonstrate that fee...
A. F. Rovers, H. A. van Essen