Sciweavers

125 search results - page 20 / 25
» Non-Exposure Location Anonymity
Sort
View
CRITICAL
2005
13 years 11 months ago
Involving non-players in pervasive games
In traditional computer games, it is not uncommon for the game world to be inhabited by numerous computergenerated characters, Non-Player Characters (NPCs). In pervasive games, pl...
Jenny Niemi, Susanna Sawano, Annika Waern
SYNTHESE
2011
96views more  SYNTHESE 2011»
13 years 3 months ago
Models and the locus of their truth
If models can be true, where is their truth located? Giere (e.g. 1988) has suggested an account of theoretical models on which models themselves are not truth-valued. The paper su...
Uskali Mäki
CCS
2009
ACM
14 years 3 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
WISEC
2010
ACM
13 years 6 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
CCS
2011
ACM
12 years 9 months ago
Privacy and accountability for location-based aggregate statistics
A significant and growing class of location-based mobile applications aggregate position data from individual devices at a server and compute aggregate statistics over these posi...
Raluca A. Popa, Andrew J. Blumberg, Hari Balakrish...