Sciweavers

391 search results - page 57 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
MOBISYS
2003
ACM
14 years 8 months ago
Characterizing Mobility and Network Usage in a Corporate Wireless Local-Area Network
Wireless local-area networks are becoming increasingly popular. They are commonplace on university campuses and inside corporations, and they have started to appear in public area...
Magdalena Balazinska, Paul Castro
CHI
2006
ACM
14 years 9 months ago
Attention funnel: omnidirectional 3D cursor for mobile augmented reality platforms
The attention funnel is a general purpose AR interface technique that interactively guides the attention of a user to any object, person, or place in space. The technique utilizes...
Frank Biocca, Arthur Tang, Charles B. Owen, Fan Xi...
ICRA
1999
IEEE
119views Robotics» more  ICRA 1999»
14 years 28 days ago
Development of a Visual Space-Mouse
The pervasiveness of computers in everyday life coupled with recent rapid advances in computer technology have created both the need and the means for sophisticated Human Computer...
Tobias Peter Kurpjuhn, Alexa Hauck, Kevin Nickels,...
CCS
2011
ACM
12 years 8 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
ICCS
2007
Springer
14 years 2 months ago
A Privacy-Aware Identity Design for Exploring Ubiquitous Collaborative Wisdom
Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...
Yuanchu Hwang, Soe-Tsyr Yuan