Sciweavers

1034 search results - page 47 / 207
» User Models and User Physical Capability
Sort
View
72
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Joint Bayesian positioning and multipath mitigation in GNSS
A sequential Bayesian estimation algorithm for joint positioning and multipath mitigation within satellite navigation receivers is presented. The underlying process model is espec...
Bernhard Krach, Michael Lentmaier, Patrick Roberts...
148
Voted
IWCMC
2006
ACM
15 years 9 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
103
Voted
ER
2009
Springer
104views Database» more  ER 2009»
15 years 10 months ago
Modelling Safe Interface Interactions in Web Applications
Abstract. Current Web applications embed sophisticated user interfaces and business logic. The original interaction paradigm of the Web based on static content pages that are brows...
Marco Brambilla, Jordi Cabot, Michael Grossniklaus
228
Voted
CSE
2009
IEEE
15 years 10 months ago
Solutions to Security and Privacy Issues in Mobile Social Networking
—Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable of running applicati...
Aaron Beach, Mike Gartrell, Richard Han
110
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...