Sciweavers

232 search results - page 20 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
PET
2007
Springer
14 years 4 months ago
Louis, Lester and Pierre: Three Protocols for Location Privacy
Abstract. Location privacy is of utmost concern for location-based services. It is the property that a person’s location is revealed to other entities, such as a service provider...
Ge Zhong, Ian Goldberg, Urs Hengartner
ICDM
2006
IEEE
110views Data Mining» more  ICDM 2006»
14 years 3 months ago
A mining method of communities keeping tacit knowledge
The research community plays a very important role in holding valuable scientific knowledge. The authors propose a community mining system which helps to find communities of res...
Ryutaro Ichise, Hideaki Takeda, Satoshi Kouno, Tai...
MSE
2005
IEEE
133views Hardware» more  MSE 2005»
14 years 3 months ago
Embedded System Design with FPGAs Using HDLs (Lessons Learned and Pitfalls to Be Avoided)
This paper describes the authors experience with teaching VHDL (and more recently, Verilog) to undergraduate and graduate students at WPI and to engineers through various short co...
R. James Duckworth
MM
2004
ACM
84views Multimedia» more  MM 2004»
14 years 3 months ago
Tools used while developing auracle: a voice-controlled networked instrument
Auracle is a networked sound instrument controlled by the voice. Users jam together over the Internet using only a microphone. Throughout the development process, the authors expe...
Kristjan Varnik, Jason Freeman, Chandrasekhar Rama...
CHI
2007
ACM
14 years 1 months ago
Making mashups with marmite: towards end-user programming for the web
There is a tremendous amount of web content available today, but it is not always in a form that supports end-users' needs. In many cases, all of the data and services needed...
Jeffrey Wong, Jason I. Hong