Sciweavers

449 search results - page 49 / 90
» User experiences with sharing and access control
Sort
View
POPL
2000
ACM
15 years 5 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
ICIS
2004
15 years 2 months ago
Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective
Location-based services (LBS), enabled by advances in mobile and positioning technologies, have afforded users with a pervasive flexibility to be uniquely addressable and to acces...
Heng Xu, Hock-Hai Teo
CRIWG
2010
15 years 2 months ago
Supporting Asynchronous Workspace Awareness by Visualizing the Story Evolution in Collaborative Storytelling
Abstract. Workspace awareness support is mandatory for group support systems. In this paper, we present a novel approach to asynchronous awareness by means of traceability support....
Jana Schumann, Tanja Buttler, Stephan Lukosch
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
15 years 1 months ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin
CAISE
2003
Springer
15 years 6 months ago
PIX-Grid: A Platform for P2P Photo Exchange
The proliferation of digital camera devices (stand-alone or combined with cell phones), new protocols such as MMS and the desire of people to communicate and share their experience...
Karl Aberer, Philippe Cudré-Mauroux, Anwita...