Sciweavers

841 search results - page 134 / 169
» RFIDs and Personal Privacy
Sort
View
SEMWEB
2007
Springer
14 years 4 months ago
Access Control for Sharing Semantic Data across Desktops
Abstract. Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obvious...
Ekaterini Ioannou, Juri Luca De Coi, Arne Wolf Koe...
ADHOCNOW
2006
Springer
14 years 4 months ago
Improved Pairing Protocol for Bluetooth
Abstract. The Bluetooth wireless technology realizes a low-cost shortrange wireless voice- and data-connection through radio propagation. Bluetooth also has a security architecture...
Dave Singelée, Bart Preneel
AAAIDEA
2005
IEEE
14 years 3 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
ATAL
2005
Springer
14 years 3 months ago
Bumping strategies for the multiagent agreement problem
We introduce the Multiagent Agreement Problem (MAP) to represent a class of multiagent scheduling problems. MAP is based on the Distributed Constraint Reasoning (DCR) paradigm and...
Pragnesh Jay Modi, Manuela M. Veloso
SACMAT
2004
ACM
14 years 3 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste