Sciweavers

708 search results - page 134 / 142
» Implementing access control to people location information
Sort
View
CCS
2008
ACM
13 years 9 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
JECR
2002
120views more  JECR 2002»
13 years 7 months ago
Strategic Connectivity in Extended Enterprise Networks
Extended enterprises are networks of organizations interconnected to exchange critical resources, such as raw materials, labor, access to markets, specialized skills and knowledge...
John Tillquist
ICAT
2006
IEEE
14 years 1 months ago
Projected Reality - Content Delivery Right onto Objects of Daily Life
—Spatial augmented reality using controllable projector-camera-systems to project onto objects directly, or Projected Reality as we call it, offers the possibility to augment obj...
Jochen Ehnes, Michitaka Hirose
ESWS
2010
Springer
14 years 13 days ago
Finding Your Way through the Rijksmuseum with an Adaptive Mobile Museum Guide
Abstract. This paper describes a real-time routing system that implements a mobile museum tour guide for providing personalized tours tailored to the user position inside the museu...
Willem Robert van Hage, Natalia Stash, Yiwen Wang,...
ICPADS
2006
IEEE
14 years 1 months ago
Oriented Overlays For Clustering Client Requests To Data-Centric Network Services
Many of the data-centric network services deployed today hold massive volumes of data at their origin websites, and access the data to dynamically generate responses to user reque...
Congchun He, Vijay Karamcheti