Sciweavers

708 search results - page 79 / 142
» Implementing access control to people location information
Sort
View
SOUPS
2005
ACM
14 years 1 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
14 years 17 days ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
RAS
2002
105views more  RAS 2002»
13 years 7 months ago
Visually guided manipulation tasks
In this paper, we present a framework for a robotic system with the ability to perform real-world manipulation tasks. The complexity of such tasks determines the precision and fre...
Danica Kragic, Lars Petersson, Henrik I. Christens...

Publication
210views
15 years 5 months ago
Using GIS to Measure the Effect of Overlapping Service Areas on Passenger Boardings at Bus Stops
This study examines the effects of overlapping walking service areas of bus stops on the demand for bus transit. This requires controlling for variation in potential transit demand...
T. J. Kimpel, K. Dueker, A. M. El-Geneidy

Publication
172views
14 years 9 months ago
The Spatial Patterns Affecting Home to Work Distances of Two-Worker Households
Round-trips between home and work represent, for the majority of people, most of their daily commuting time; also, setting home and work places involves more constraints for two- ...
Surprenant-Legault, J and El-Geneidy A.