Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...
—Nonverbal behaviors serve as a rich source of information in inter human communication. In particular, motion cues can reveal details on a person’s current physical and mental...
In this paper, we propose a Vehicular Surveillance and Sensing System (VS3 ), which targets at car security and tracking applications. VS3 can be triggered by events detected insi...
Information grounds are places where people exchange information. Here we examine use of a mobile device-based social networking service as an information ground. The service allo...