Sciweavers

1856 search results - page 299 / 372
» Phoning it in
Sort
View
JSW
2008
101views more  JSW 2008»
13 years 9 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
KES
2008
Springer
13 years 9 months ago
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties
Abstract. Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-proces...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
ENTCS
2007
115views more  ENTCS 2007»
13 years 9 months ago
Self Management and the Future of Software Design
Most software is fragile: even the slightest error, such as changing a single bit, can make it crash. As software complexity has increased, development techniques have kept pace t...
Peter Van Roy
NETWORK
2008
107views more  NETWORK 2008»
13 years 9 months ago
Wireless Mesh Networks for In-Home IPTV Distribution
IPTV is considered to be the next killer application. A key, challenging issue is inhome IPTV distribution with affordable deployment cost and sufficient flexibility, scalability,...
Emad Shihab, Lin Cai, Fengdan Wan, T. Aaron Gulliv...
PERVASIVE
2008
Springer
13 years 9 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...