Sciweavers

2347 search results - page 441 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
CIKM
2005
Springer
14 years 1 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
IPSN
2005
Springer
14 years 1 months ago
Adaptive statistical sampling methods for decentralized estimation and detection of localized phenomena
— Sensor networks (SNETs) for monitoring spatial phenomena has emerged as an area of significant practical interest. We focus on the important problem of detection of distribute...
Erhan Baki Ermis, Venkatesh Saligrama
CSCW
2004
ACM
14 years 1 months ago
Avoiding interference: how people use spatial separation and partitioning in SDG workspaces
Single Display Groupware (SDG) lets multiple co-located people, each with their own input device, interact simultaneously over a single communal display. While SDG is beneficial, ...
Edward Tse, Jonathan Histon, Stacey D. Scott, Saul...
IMC
2004
ACM
14 years 1 months ago
A pragmatic approach to dealing with high-variability in network measurements
The Internet is teeming with high variability phenomena, from measured IP flow sizes to aspects of inferred router-level connectivity, but there still exists considerable debate ...
Walter Willinger, David Alderson, Lun Li
ISI
2004
Springer
14 years 1 months ago
SECRETS: A Secure Real-Time Multimedia Surveillance System
We propose a surveillance framework (SECRETS: SECure Real-time ElecTronic Surveillance) that is a practical solution to safeguarding sensitive physical facilities like command and ...
Naren Kodali, Csilla Farkas, Duminda Wijesekera