Sciweavers

708 search results - page 29 / 142
» Implementing access control to people location information
Sort
View
WWW
2006
ACM
14 years 8 months ago
Geographic locations of web servers
The ccTLD (country code Top Level Domain) in a URL does not necessarily point to the geographic location of the server concerned. The authors have surveyed sample servers belongin...
Katsuko T. Nakahira, Tetsuya Hoshino, Yoshiki Mika...
WMCSA
2009
IEEE
14 years 2 months ago
Enabling new mobile applications with location proofs
Location is rapidly becoming the next “killer application” as location-enabled mobile handheld devices proliferate. One class of applications that has yet-to-emerge are those ...
Stefan Saroiu, Alec Wolman
CHI
2008
ACM
14 years 8 months ago
Where no interface has gone before: what can the phaser teach us about label usage in hci?
Most research on how people represent procedures suggests that control labels are central. However, our data suggest that even moderately-experienced users do not rely on labels t...
Franklin P. Tamborello II, Phillip H. Chung, Micha...
LCN
2008
IEEE
14 years 2 months ago
IPclip: An architecture to restore Trust-by-Wire in packet-switched networks
—During the last decades, the Internet has steadily developed into a mass medium. The target group radically changed compared to, e.g., the 90s. Because virtually everyone has ac...
Harald Widiger, Stephan Kubisch, Peter Danielis, J...
MOBISYS
2007
ACM
14 years 7 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi