Sciweavers

784 search results - page 63 / 157
» Personalizing access to learning networks
Sort
View
PERCOM
2009
ACM
15 years 11 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
SAINT
2005
IEEE
15 years 10 months ago
The Simplicity Project: Architecture Concept
The research community is working towards a new allencompassing vision of the Internet. This vision certainly includes powerful transport and switching technologies, wireless netw...
Nicola Blefari-Melazzi, Wolfgang Kellerer, Chie No...
COMPSAC
2006
IEEE
15 years 10 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
EUC
2005
Springer
15 years 9 months ago
Ubiquitous Content Formulations for Real-Time Information Communications
Abstract. With rapid advancements in wireless devices, ubiquitous computing seems becoming a reality everyday. Active pervasive network infrastructure has been introduced to offer...
Ka Lun Eddie Law, Sunny So
SOCIALCOM
2010
15 years 2 months ago
A Private and Reliable Recommendation System for Social Networks
Abstract--With the proliferation of internet-based social networks into our lives, new mechanisms to control the release and use of personal data are required. As a step toward thi...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla