Sciweavers

5450 search results - page 15 / 1090
» Personalization of tagging systems
Sort
View
SOUPS
2009
ACM
14 years 3 months ago
Treat 'em like other devices: user authentication of multiple personal RFID tags
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris
HCI
2009
13 years 6 months ago
Social Adaptation of ERP Software: Tagging UI Elements
Abstract. In this paper we present a newly designed annotation and collaboration component, which has been prototypically implemented on top of an ERP (Enterprise Resource Planning...
Marcus Nitsche, Martin Christof Kindsmüller, ...
LOCA
2007
Springer
14 years 3 months ago
LifeTag: WiFi-Based Continuous Location Logging for Life Pattern Analysis
Continuous logging of a person’s geographical position is required for various “life-log” applications, such as memory aids, automatic blog generation, and life pattern analy...
Jun Rekimoto, Takashi Miyaki, Takaaki Ishizawa
JCDL
2006
ACM
151views Education» more  JCDL 2006»
14 years 3 months ago
Tagging of name records for genealogical data browsing
In this paper we present a method of parsing unstructured textual records briefly describing a person and their direct relatives, which we use in the construction of a browsing t...
Mike Perrow, David Barber
UCS
2007
Springer
14 years 3 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti