Sciweavers

589 search results - page 47 / 118
» Evaluating mobile phones as risk information providers
Sort
View
ICTAI
2009
IEEE
14 years 3 months ago
Preventing Unwanted Social Inferences with Classification Tree Analysis
A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...
Sara Motahari, Sotirios G. Ziavras, Quentin Jones
CAISE
2007
Springer
14 years 3 months ago
Publishing and Discovering Information and Services for Tagged Products
Radio frequency identification (RFID), and more recently the development of Near Field Communication (NFC) technology, have popularized the idea of linking real-world products wit...
Christof Roduner, Marc Langheinrich
INFOCOM
2007
IEEE
14 years 3 months ago
Information Survival Threshold in Sensor and P2P Networks
— Consider a network of, say, sensors, or P2P nodes, or bluetooth-enabled cell-phones, where nodes transmit information to each other and where links and nodes can go up or down....
Deepayan Chakrabarti, Jure Leskovec, Christos Falo...
DEXAW
2004
IEEE
166views Database» more  DEXAW 2004»
14 years 17 days ago
Development of Flexible Peer-To-Peer Information Systems Using Adaptable Mobile Agents
Wide-area networks provide an easy access to many different distributed and heterogeneous data sources. The development of automated operating tools is still complex, particularly...
Jean-Paul Arcangeli, Sebastien Leriche, Marc Pante...
ACL
2003
13 years 10 months ago
A Speech Interface for Open-Domain Question-Answering
Speech interfaces to question-answering systems offer significant potential for finding information with phones and mobile networked devices. We describe a demonstration of spok...
Edward Schofield, Zhiping Zheng