Sciweavers

497 search results - page 28 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
ICNP
2002
IEEE
15 years 9 months ago
Using Adaptive Rate Estimation to Provide Enhanced and Robust Transport over Heterogeneous Networks
The rapid advancement in wireless communication technology has spurred significant interest in the design and development of enhanced TCP protocols. Among them, TCP Westwood (TCPW...
Ren Wang, Massimo Valla, M. Y. Sanadidi, Mario Ger...
ISI
2008
Springer
15 years 2 months ago
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime
We discuss how methods from social network analysis could be combined with methodologies from database mediator technology and information fusion in order to give police and other ...
Luigi Ferrara, Christian Mårtenson, Pontus S...
PERCOM
2010
ACM
15 years 2 months ago
Privacy-enhanced social network routing in opportunistic networks
Opportunistic networking - forwarding messages in a disconnected mobile ad hoc network via any encountered nodes - otters a new mechanism for exploiting the mobile devices that man...
Iain Parris, Greg Bigwood, Tristan Henderson
IPMU
2010
Springer
15 years 2 months ago
See-Through Vision: A Visual Augmentation Method for Sensing-Web
Abstract. Many surveillance cameras are being installed throughout the environments of our daily lives because they effectively maintain safety and offer security to ordinary peopl...
Yuichi Ohta, Yoshinari Kameda, Itaru Kitahara, Mas...
HCI
2007
15 years 5 months ago
Designing Smart Living Objects - Enhancing vs. Distracting Traditional Human-Object Interaction
Abstract. To realize Weiser’s vision of ubiquitous computing, a popular approach has been to create so-called smart living objects, which are everyday objects in our living envir...
Pei-yu Chi, Jen-hao Chen, Shih-yen Liu, Hao-Hua Ch...