Sciweavers

609 search results - page 105 / 122
» A Privacy Manager for Cloud Computing
Sort
View
CHI
2005
ACM
14 years 8 months ago
Listening in: practices surrounding iTunes music sharing
This paper presents a descriptive account of the social practices surrounding the iTunes music sharing of 13 participants in one organizational setting. Specifically, we character...
Amy Voida, Rebecca E. Grinter, Nicolas Ducheneaut,...
MOBISYS
2005
ACM
14 years 7 months ago
Deploying and evaluating a location-aware system
Location-aware systems are typically deployed on a small scale and evaluated technically, in terms of absolute errors. In this paper, the authors present their experience of deplo...
Robert K. Harle, Andy Hopper
MIDDLEWARE
2007
Springer
14 years 1 months ago
Middleware support for protecting personal data from web based data services
Web based data services are very popular with the average computer user. Examples of such services include Gmail.com, Yahoo Photos, Yahoo Briefcase and Amazon S3 Service. In such ...
Ravi Chandra Jammalamadaka
IDTRUST
2010
ACM
14 years 18 days ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
CSREASAM
2006
13 years 9 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai