Sciweavers

497 search results - page 36 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
SIGCSE
2002
ACM
218views Education» more  SIGCSE 2002»
15 years 4 months ago
Participatory design in a human-computer interaction course: teaching ethnography methods to computer scientists
Empirical evidence shows the ability for computer technology to deliver on its promises of enhancing our quality of life relies on how well the application fits our understanding ...
Jerry B. Weinberg, Mary L. Stephen
ESORICS
2009
Springer
15 years 11 months ago
Access Control in Location-Based Services
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of user...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 8 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
ISQED
2003
IEEE
123views Hardware» more  ISQED 2003»
15 years 9 months ago
Advanced Module Packaging Method
An intermediate solution between conventional printed circuit board technology and wafer level packaging, WLP, is to fabricate interconnection circuits and flip chip assembly stru...
Peter C. Salmon
SAC
2006
ACM
15 years 10 months ago
Methods and guidelines for the design and development of domestic ubiquitous computing applications
Bringing ubiquitous computing applications to home environments is a great challenge. In our research we investigate how applications can be conceived, designed, and implemented t...
Albrecht Schmidt, Lucia Terrenghi