Sciweavers

3395 search results - page 592 / 679
» Computational Differential Privacy
Sort
View
MHCI
2009
Springer
15 years 10 months ago
Expectations for user experience in haptic communication with mobile devices
The haptic modality – the sense of touch – is utilized very limitedly in current human-computer interaction. Especially in mobile communication, the haptic modality could prov...
Jani Heikkinen, Thomas Olsson, Kaisa Vää...
125
Voted
SACMAT
2009
ACM
15 years 10 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...
164
Voted
ICDCS
2008
IEEE
15 years 10 months ago
PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted Living
Advances in networking, sensors, medical devices and smart phones have made it feasible to monitor and provide medical and other assistance to people either in their homes or outs...
Zheng Zeng, S. Yu, Wook Shin, Jennifer C. Hou
IPPS
2008
IEEE
15 years 10 months ago
On performance bottleneck of anonymous communication networks
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there i...
Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu
NDSS
2008
IEEE
15 years 10 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...