Sciweavers

2272 search results - page 426 / 455
» Provable Data Privacy
Sort
View
CHI
2007
ACM
14 years 8 months ago
Exploring patterns of social commonality among file directories at work
We studied files stored by members of a work organization for patterns of social commonality. Discovering identical or similar documents, applications, developer libraries, or oth...
John C. Tang, Clemens Drews, Mark Smith, Fei Wu, A...
EDBT
2006
ACM
118views Database» more  EDBT 2006»
14 years 8 months ago
On Honesty in Sovereign Information Sharing
Abstract. We study the following problem in a sovereign informationsharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave hone...
Rakesh Agrawal, Evimaria Terzi
PERCOM
2006
ACM
14 years 7 months ago
Inverted Browser: A Novel Approach towards Display Symbiosis
In this paper we introduce the Inverted Browser, a novel approach to enable mobile users to view content from their personal devices on public displays. The Inverted Browser is a ...
Mandayam T. Raghunath, Nishkam Ravi, Marcel-Catali...
MOBISYS
2005
ACM
14 years 7 months ago
Deploying and evaluating a location-aware system
Location-aware systems are typically deployed on a small scale and evaluated technically, in terms of absolute errors. In this paper, the authors present their experience of deplo...
Robert K. Harle, Andy Hopper
MOBIHOC
2003
ACM
14 years 7 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong