Sciweavers

115 search results - page 17 / 23
» Privacy Guarantees through Distributed Constraint Satisfacti...
Sort
View
WETICE
2003
IEEE
14 years 22 days ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
MDM
2007
Springer
125views Communications» more  MDM 2007»
14 years 1 months ago
Extending P3P/Appel for Friend Finder
FriendFinder as a location-based service collects location data from mobile users and distributes a particular user’s location upon request. Privacy of users data especially loc...
Emin Islam Tatli
GI
2009
Springer
13 years 5 months ago
Spontaneous and Privacy-friendly Mobile Indoor Routing and Navigation
Abstract: Mobile indoor navigation systems guide users through buildings and premises by taking into account the current position of the user and a destination such as a room, offi...
Peter Ruppel, Florian Gschwandtner
WPES
2003
ACM
14 years 21 days ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
ICRA
1994
IEEE
102views Robotics» more  ICRA 1994»
13 years 11 months ago
Articulated Structures with Tendon Actuation for Whole-Limb Manipulation
We present a general framework for the modelling of a class of mechanical systems for robotic manipulation, consisting of articulated limbs with redundant tendinous actuation and ...
Paolo Petreschi, Domenico Prattichizzo, Antonio Bi...