Sciweavers

2394 search results - page 390 / 479
» Implementing Mobile Haskell
Sort
View
GIS
2009
ACM
14 years 10 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
WWW
2009
ACM
14 years 9 months ago
What's up CAPTCHA?: a CAPTCHA based on image orientation
We present a new CAPTCHA which is based on identifying an image's upright orientation. This task requires analysis of the often complex contents of an image, a task which hum...
Rich Gossweiler, Maryam Kamvar, Shumeet Baluja
WWW
2007
ACM
14 years 9 months ago
Delay tolerant applications for low bandwidth and intermittently connected users: the aAQUA experience
With the explosive growth and spread of Internet, web access from mobile and rural users has become significant. But these users face problems of low bandwidth and intermittent In...
Saurabh Sahni, Krithi Ramamritham
WWW
2007
ACM
14 years 9 months ago
Providing session management as core business service
It is extremely hard for a global organization with services over multiple channels to capture a consistent and unified view of its data, services, and interactions. While SOA and...
Ismail Ari, Jun Li, Riddhiman Ghosh, Mohamed Dekhi...
WWW
2004
ACM
14 years 9 months ago
A generic uiml vocabulary for device- and modality independent user interfaces
We present in this poster our work on a User Interface Markup Language (UIML) vocabulary for the specification of device- and modality independent user interfaces. The work presen...
Rainer Simon, Michael Jank, Florian Wegscheider