Sciweavers

503 search results - page 53 / 101
» Authenticity by tagging and typing
Sort
View
ICDE
2008
IEEE
157views Database» more  ICDE 2008»
14 years 10 months ago
Spatial Outsourcing for Location-based Services
- The embedding of positioning capabilities in mobile devices and the emergence of location-based applications have created novel opportunities for utilizing several types of multi...
Yin Yang, Stavros Papadopoulos, Dimitris Papadias,...
CHI
2005
ACM
14 years 9 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
JNW
2008
126views more  JNW 2008»
13 years 8 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
CN
2004
108views more  CN 2004»
13 years 8 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
COLING
2010
13 years 3 months ago
Enhanced Sentiment Learning Using Twitter Hashtags and Smileys
Automated identification of diverse sentiment types can be beneficial for many NLP systems such as review summarization and public media analysis. In some of these systems there i...
Dmitry Davidov, Oren Tsur, Ari Rappoport