Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
This paper describes the design of a service that provides nutritional feedback to female college freshmen. A variety of background research methods-food journals, competitive pro...
Web services are evolving quickly in terms of standardization. Technology and wireless networks exact requirements upon web services used via wireless connections, such as mobile ...
Abstract. At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single...
A major challenge in deploying service robots into the real world is to design a framework that provides effective, long-term interactions with people. This includes interacting w...
Christopher King, Xavier Palathingal, Monica N. Ni...