Sciweavers

1761 search results - page 320 / 353
» Data Sharing and Querying for Peer-to-Peer Data Management S...
Sort
View
RTCSA
2007
IEEE
14 years 1 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
CORR
2006
Springer
92views Education» more  CORR 2006»
13 years 7 months ago
Personal Information Ecosystems and Implications for Design
Today, people use multiple devices to fulfill their information needs. However, designers design each device individually, without accounting for the other devices that users may ...
Manas Tungare, Pardha S. Pyla, Manuel A. Pé...
PADS
2003
ACM
14 years 26 days ago
HLA-based Adaptive Distributed Simulation of Wireless Mobile Systems
Wireless networks’ models differ from wired ones at least in the innovative dynamic effects of host-mobility and open-broadcast nature of the wireless medium. Topology changes d...
Luciano Bononi, Gabriele D'Angelo, Lorenzo Donatie...
CIKM
2008
Springer
13 years 9 months ago
Modeling multi-step relevance propagation for expert finding
An expert finding system allows a user to type a simple text query and retrieve names and contact information of individuals that possess the expertise expressed in the query. Thi...
Pavel Serdyukov, Henning Rode, Djoerd Hiemstra
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
14 years 7 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...