Sciweavers

947 search results - page 56 / 190
» Information Security in Mobile Databases
Sort
View
132
Voted
CSE
2009
IEEE
15 years 10 months ago
Ambulation: A Tool for Monitoring Mobility Patterns over Time Using Mobile Phones
An important tool for evaluating the health of patients who suffer from mobility-affecting chronic diseases such as MS, Parkinson’s, and Muscular Dystrophy is assessment of how ...
Jason Ryder, Brent Longstaff, Sasank Reddy, Debora...
132
Voted
CHI
2007
ACM
16 years 4 months ago
The impact of digital iconic realism on anonymous interactants' mobile phone communication
In this paper, I describe progress in research designed to explore the effect of the combination of behavioral and visual fidelity of avatars on users' social presence in syn...
Sin-Hwa Kang
106
Voted
ICDE
2007
IEEE
124views Database» more  ICDE 2007»
15 years 10 months ago
Secure Content Validation
Information dissemination in electronic form has improved drastically over the past few years. New technologies in web feeds allow the uses to get notified automatically when new...
Mummoorthy Murugesan, Wei Jiang
122
Voted
HICSS
2005
IEEE
111views Biometrics» more  HICSS 2005»
15 years 9 months ago
Using Information Extraction for Quality Analysis in Human Authentication
During the past decade there have been significant advances in the field of Natural Language Processing (NLP) and, in particular, Information Extraction (IE) [2] which have fueled...
Kiyoshi Sudo, Amit Bagga, Lawrence O'Gorman, Jon L...
108
Voted
IWSEC
2007
Springer
15 years 9 months ago
Accredited Symmetrically Private Information Retrieval
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...
Mohamed Layouni