Sciweavers

3299 search results - page 617 / 660
» Privacy and Trusted Computing
Sort
View
GROUP
2007
ACM
14 years 18 days ago
Searching for experts in the enterprise: combining text and social network analysis
Employees depend on other people in the enterprise for rapid access to important information. But current systems for finding experts do not adequately address the social implicat...
Kate Ehrlich, Ching-Yung Lin, Vicky Griffiths-Fish...
ICDCS
2010
IEEE
14 years 16 days ago
Fingerprinting Mobile User Positions in Sensor Networks
- We demonstrate that the network flux over the sensor network provides us fingerprint information about the mobile users within the field. Such information is exoteric in the phys...
Mo Li, Xiaoye Jiang, Leonidas J. Guibas
AINA
2010
IEEE
14 years 4 days ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores
PERVASIVE
2010
Springer
14 years 3 days ago
Object-Based Activity Recognition with Heterogeneous Sensors on Wrist
Abstract. This paper describes how we recognize activities of daily living (ADLs) with our designed sensor device, which is equipped with heterogeneous sensors such as a camera, a ...
Takuya Maekawa, Yutaka Yanagisawa, Yasue Kishino, ...
ICCSA
2010
Springer
13 years 10 months ago
An Identifiable Yet Unlinkable Authentication System with Smart Cards for Multiple Services
The purpose of this paper is to realize an authentication system which satisfies four requirements for security, privacy protection, and usability, that is, impersonation resistanc...
Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Ke...