Sciweavers

2217 search results - page 440 / 444
» A Data Privacy Taxonomy
Sort
View
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
14 years 9 days ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
EELC
2006
156views Languages» more  EELC 2006»
14 years 7 days ago
The Human Speechome Project
The Human Speechome Project is an effort to observe and computationally model the longitudinal course of language development for a single child at an unprecedented scale. The ide...
Deb Roy, Rupal Patel, Philip DeCamp, Rony Kubat, M...
MOBISYS
2010
ACM
13 years 11 months ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...
ATAL
2008
Springer
13 years 10 months ago
Self-interested database managers playing the view maintenance game
A database view is a dynamic virtual table composed of the result set of a query, often executed over different underlying databases. The view maintenance problem concerns how a v...
Hala Mostafa, Victor R. Lesser, Gerome Miklau
CSCW
2008
ACM
13 years 10 months ago
Social networks and context-aware spam
Social networks are popular for online communities. This paper evaluates the risk of sophisticated context-aware spam that could result from information sharing on social networks...
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Pra...