— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Threshold devices present information gathered from the home's surroundings to give new views on the domestic situation. We built two prototypes of different threshold device...
William W. Gaver, Andy Boucher, Andy Law, Sarah Pe...
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
This paper reviews worldwide activities on regional information spaces. In the US and Canada, a large number of community networks appeared in the early 1990s. As a platform for co...
Most of the Web-based methods for lexicon augmenting consist in capturing global semantic features of the targeted domain in order to collect relevant documents from the Web. We s...