Sciweavers

841 search results - page 46 / 169
» RFIDs and Personal Privacy
Sort
View
ICWSM
2008
13 years 10 months ago
Examining Privacy in Blogging from the Reader's Perspective
While previous work has studied bloggers' practices with respect to negotiating privacy, little research has been done on blog readers' perceptions of privacy. This post...
Eric Baumer, Mark Sueyoshi, Bill Tomlinson
ICIP
2005
IEEE
14 years 10 months ago
Hiding privacy information in video surveillance system
This paper proposes a detailed framework of storing privacy information in surveillance video as a watermark. Authorized personnel is not only removed from the surveillance video ...
Wei Zhang, Sen-Ching S. Cheung, Minghua Chen
SEMWEB
2007
Springer
14 years 3 months ago
Recommendation Privacy Protection in Trust-based Knowledge Sharing Network
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Weisen Guo, Steven B. Kraines
ERCIMDL
2004
Springer
137views Education» more  ERCIMDL 2004»
14 years 2 months ago
Managing a Paradigm Shift - Aligning Management, Privacy Policy, Technology and Standards
It is argued that we are experiencing a paradigm shift from a user perspective to a client perspective in library and information science. The paradigm shift is brought about by re...
Jonas Holmström
IPSN
2005
Springer
14 years 2 months ago
Some sensor network elements for ubiquitous computing
— Ubiquitous computing applications often use a user's context to automatically adjust their behavior to the situation. We have developed three types of wireless sensor node...
Waylon Brunette, Jonathan Lester, Adam D. Rea, Gae...