Sciweavers

125 search results - page 24 / 25
» Non-Exposure Location Anonymity
Sort
View
MSWIM
2006
ACM
14 years 1 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda
SIES
2009
IEEE
14 years 2 months ago
A wireless body sensor network for the prevention and management of asthma
—We present an application of an open source platform for wireless body sensor network called DexterNet to the problem of children’s asthma. The architecture of the system cons...
Edmund Y. W. Seto, Annarita Giani, Victor Shia, Cu...
LCN
2008
IEEE
14 years 2 months ago
IPclip: An architecture to restore Trust-by-Wire in packet-switched networks
—During the last decades, the Internet has steadily developed into a mass medium. The target group radically changed compared to, e.g., the 90s. Because virtually everyone has ac...
Harald Widiger, Stephan Kubisch, Peter Danielis, J...
IRI
2007
IEEE
14 years 2 months ago
Natural Language Processing and e-Government: Extracting Reusable Crime Report Information
Crime reporting needs to be possible 24/7. Although 911 and tip-lines are the most publicized reporting mechanisms, several other options exist, ranging from inperson reporting to...
Alicia Iriberri, Gondy Leroy
MOBISYS
2007
ACM
14 years 7 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi