Sciweavers

680 search results - page 44 / 136
» Locating Hidden Servers
Sort
View
PERCOM
2006
ACM
14 years 9 months ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste
SASO
2009
IEEE
14 years 5 months ago
Swarming Geographic Event Profiling, Link Analysis, and Prediction
Geographically embedded processes with hidden origins are often observable in events they generate. It is common practice in criminological forensics to reverse simple equation-ba...
Sven A. Brueckner
PERCOM
2006
ACM
14 years 4 months ago
Groupanizer: a Method to Correlate Multi-users Position with Daily Moments
Groupanizer is an extension of groupware and constitutes a development platform to integrate user-centric information for the benefit of groupware applications. User-centric conte...
Jean Olivier Caron, Yoshihiro Kawahara, Hiroyuki M...
CCS
2011
ACM
12 years 10 months ago
Privacy and accountability for location-based aggregate statistics
A significant and growing class of location-based mobile applications aggregate position data from individual devices at a server and compute aggregate statistics over these posi...
Raluca A. Popa, Andrew J. Blumberg, Hari Balakrish...
MATA
2004
Springer
139views Communications» more  MATA 2004»
14 years 3 months ago
Support for Context-Aware Collaboration
This paper describes a middleware architecture with its location inference service (LIS), and an application for context-aware mobile collaboration which is based on this architec...
Hana K. Rubinsztejn, Markus Endler, Vagner Sacrame...