Sciweavers

497 search results - page 49 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
HUC
2010
Springer
15 years 5 months ago
Throw your photos: an intuitive approach for sharing between mobile phones and interactive tables
Many approaches have been proposed to connect mobile phones with interactive tables. Most rely on having the phone placed on table all times, which may hinder the overall user exp...
Fadi Chehimi, Enrico Rukzio
RULEML
2005
Springer
15 years 10 months ago
A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery
Enforcing rich policies in open environments will increasingly require the ability to dynamically identify external sources of information necessary to enforce different policies (...
Jinghai Rao, Norman M. Sadeh
PUC
2000
142views more  PUC 2000»
15 years 4 months ago
Context-Aware Telephony Over WAP
In this paper we introduce a novel approach to share context to enhance the social quality of remote mobile communication. We provide an analysis of how people start a conversation...
Albrecht Schmidt, Antti Takaluoma, Jani Mänty...
ISQED
2007
IEEE
136views Hardware» more  ISQED 2007»
15 years 10 months ago
Strain Silicon Optimization for Memory and Logic in Nano-Scale CMOS
Straining of silicon improves mobility of carriers resulting in speed enhancement for transistors in CMOS technology. Traditionally, silicon straining is applied in a similar ad-h...
Rajani Kuchipudi, Hamid Mahmoodi
WETICE
1998
IEEE
15 years 8 months ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes