Sciweavers

8243 search results - page 1529 / 1649
» Can We Manage Trust
Sort
View
CHI
2011
ACM
13 years 15 days ago
Usability of car dashboard displays for elder drivers
The elder population is rising worldwide; in the US, no longer being able to drive is a significant marker of loss of independence. One of the approaches to helping elders drive m...
Seungjun Kim, Anind K. Dey, Joonhwan Lee, Jodi For...
INFOCOM
2011
IEEE
13 years 10 days ago
BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs
—Body sensor networks (BSNs) have been developed for a set of performance-critical applications, including smart healthcare, assisted living, emergency response, athletic perform...
Zhen Ren, Gang Zhou, Andrew Pyles, Matthew Keally,...
CCS
2011
ACM
12 years 9 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
CODASPY
2012
12 years 4 months ago
Detecting repackaged smartphone applications in third-party android marketplaces
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning
CORR
2012
Springer
227views Education» more  CORR 2012»
12 years 4 months ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
« Prev « First page 1529 / 1649 Last » Next »