Sciweavers

391 search results - page 40 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
LAWEB
2009
IEEE
14 years 3 months ago
Policy Based Protection and Personalized Generation of Web Content
Abstract—The World Wide Web offers easy sharing of information, but provides only few options for the protection of sensitive information and other sensitive resources. Tradition...
Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, W...
PERVASIVE
2007
Springer
13 years 8 months ago
Mobile Social Software: Facilitating Serendipity or Encouraging Homogeneity?
Mobile social software is currently designed and conceived to afford serendipitous social interactions in densely populated urban environments. In this paper, I argue that these s...
Jennifer Thom-Santelli
SELMAS
2004
Springer
14 years 2 months ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...
APSCC
2010
IEEE
13 years 6 months ago
Service-centric Inference and Utilization of Confidence on Context
Abstract--The inadequate quality of context forces the context consumers in pervasive environments to reason about the quality and relevance of context to be confident of its worth...
Atif Manzoor, Hong Linh Truong, Christoph Dorn, Sc...
SOCIALCOM
2010
13 years 6 months ago
A Private and Reliable Recommendation System for Social Networks
Abstract--With the proliferation of internet-based social networks into our lives, new mechanisms to control the release and use of personal data are required. As a step toward thi...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla