Sciweavers

708 search results - page 85 / 142
» Implementing access control to people location information
Sort
View
CCS
2007
ACM
14 years 1 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
CHI
2009
ACM
14 years 8 months ago
Reflections of everyday activities in spending data
In this paper we show that financial information can be used to sense many aspects of human activity. This simple technique gives people information about their daily lives, is ea...
Julia Schwarz, Jennifer Mankoff, H. Scott Matthews
SOUPS
2009
ACM
14 years 2 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
WS
2004
ACM
14 years 1 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
PERCOM
2010
ACM
13 years 11 months ago
Ad-hoc voice-based group communication
Abstract—People waste many hours driving each day. Although unavoidable, this time can be very boring to motorists. Similar to people taking mass transit who often pass the time ...
Lu Han, Stephen Smaldone, Pravin Shankar, James Bo...