Sciweavers

391 search results - page 49 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
NSPW
2006
ACM
14 years 2 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti
EUC
2008
Springer
13 years 10 months ago
Analyzing Privacy Designs of Mobile Social Networking Applications
The combined advances of open mobile platforms and online social networking applications (SNAs) are driving pervasive computing to the real-world users, as the mobile SNAs are exp...
Guanling Chen, Faruq Rahman
MOBICOM
1997
ACM
14 years 6 days ago
Dynamic Network Reconfiguration Support for Mobile Computers
Hot swapping technology combined with pervasive heterogeneous networks empowers mobile laptop users to select the best network device for their current environment. Unfortunately,...
Jon Inouye, Jim Binkley, Jonathan Walpole
PERVASIVE
2009
Springer
14 years 3 months ago
Landmark-Based Pedestrian Navigation with Enhanced Spatial Reasoning
Computer vision techniques can enhance landmark-based navigation by better utilizing online photo collections. We use spatial reasoning to compute camera poses, which are then regi...
Harlan Hile, Radek Grzeszczuk, Alan L. Liu, Ramakr...
SP
2002
IEEE
117views Security Privacy» more  SP 2002»
13 years 8 months ago
Grids: The top ten questions
The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A di...
Jennifer M. Schopf, Bill Nitzberg