Sciweavers

628 search results - page 56 / 126
» General requirements to design mobile shared workspaces
Sort
View
COMCOM
2000
95views more  COMCOM 2000»
13 years 7 months ago
Countermeasures for mobile agent security
: Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in...
Wayne A. Jansen
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
14 years 8 months ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen
MOBISYS
2007
ACM
14 years 7 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
CHI
2011
ACM
12 years 11 months ago
Publics in practice: ubiquitous computing at a shelter for homeless mothers
Today, commodity technologies like mobile phones—once symbols of status and wealth—have become deeply woven into social and economic participation in Western society. Despite ...
Christopher A. Le Dantec, Robert G. Farrell, Jim C...
WWW
2005
ACM
14 years 8 months ago
Wireless SOAP: optimizations for mobile wireless web services
We propose a set of optimization techniques, collectively called Wireless SOAP (WSOAP), to compress SOAP messages transmitted across a wireless link. The Name Space Equivalency te...
Naresh Apte, Keith Deutsch, Ravi Jain