Sciweavers

15379 search results - page 57 / 3076
» Protecting users from
Sort
View
EUROSYS
2008
ACM
14 years 4 months ago
GreenFS: making enterprise computers greener by protecting them better
Hard disks contain data—frequently an irreplaceable asset of high monetary and non-monetary value. At the same time, hard disks are mechanical devices that consume power, are no...
Nikolai Joukov, Josef Sipek
SRDS
2010
IEEE
13 years 5 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
ACSW
2007
13 years 9 months ago
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of netw...
Oliver Jorns, Gerald Quirchmayr, Oliver Jung
JSW
2008
95views more  JSW 2008»
13 years 7 months ago
Quality-of-Context and its use for Protecting Privacy in Context Aware Systems
Context-awareness refers to systems that unobtrusively adapt to the environment of their users on the basis of context information, popularly known as contextaware systems. One inh...
Kamran Sheikh, Maarten Wegdam, Marten van Sinderen
ACCV
2007
Springer
14 years 1 months ago
User-Guided Shape from Shading to Reconstruct Fine Details from a Single Photograph
Abstract. Many real objects, such as faces, sculptures, or low-reliefs are composed of many detailed parts that can not be easily modeled by an artist nor by 3D scanning. In this p...
Alexandre Meyer, Héctor M. Briceño, ...