Sciweavers

3395 search results - page 624 / 679
» Computational Differential Privacy
Sort
View
HUC
2004
Springer
15 years 8 months ago
Reminding About Tagged Objects Using Passive RFIDs
People often misplace objects they care about. We present a system that generates reminders about objects left behind by tagging those objects with passive RFID tags. Readers posit...
Gaetano Borriello, Waylon Brunette, Matthew Hall, ...
109
Voted
ISI
2004
Springer
15 years 8 months ago
A Tool for Internet Chatroom Surveillance
Internet chatrooms are common means of interaction and communications, and they carry valuable information about formal or ad-hoc formation of groups with diverse objectives. This ...
Seyit Ahmet Çamtepe, Mukkai S. Krishnamoort...
117
Voted
OOPSLA
2004
Springer
15 years 8 months ago
Notes on notes on postmodern programming: radio edit
These notes have the status of letters written to ourselves: we wrote them down because, without doing so, we found ourselves making rguments over and over again. So began the abs...
James Noble, Robert Biddle
112
Voted
NSPW
2003
ACM
15 years 8 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
WMASH
2003
ACM
15 years 8 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...