Sciweavers

650 search results - page 34 / 130
» Privacy in Non-private Environments
Sort
View
PERCOM
2008
ACM
14 years 9 months ago
Protecting Users' Anonymity in Pervasive Computing Environments
The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfort...
Linda Pareschi, Daniele Riboni, Claudio Bettini
PET
2004
Springer
14 years 3 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
EUROPKI
2004
Springer
14 years 3 months ago
A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions
The use of PKI in large scale environments suffers some inherent problems concerning the options to adopt for the optimal cost-centered operation of the system. In this paper a Mar...
Agapios N. Platis, Costas Lambrinoudakis, Assimaki...
AGENTS
2001
Springer
14 years 2 months ago
Using self-diagnosis to adapt organizational structures
The specific organization used by a multi-agent system is crucial for its effectiveness and efficiency. In dynamic environments, or when the objectives of the system shift, the ...
Bryan Horling, Brett Benyo, Victor R. Lesser
SAFECOMP
2010
Springer
13 years 8 months ago
Assurance of Automotive Safety - A Safety Case Approach
A safety case should provide a clear, comprehensible and defensible argument, supported by evidence, that a system is acceptably safe to operate in a particular environment. This a...
Robert Palin, Ibrahim Habli