Sciweavers

1018 search results - page 106 / 204
» Remote User Authentication Using Public Information
Sort
View
CHI
2005
ACM
14 years 8 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
PUC
2008
141views more  PUC 2008»
13 years 7 months ago
A calendar based Internet content pre-caching agent for small computing devices
We described in earlier publications the principles of a system where internet content would be pre-cached, based on contextual information obtained from a user's electronic ...
Andreas Komninos, Mark D. Dunlop
ICEIS
2000
IEEE
14 years 13 days ago
University Information System Fully Based on WWW
This paper describes the development of Information System (IS) at Masaryk University in Brno. It supports full range of administrative and information functions in the study area,...
Jan Pazdziora, Michal Brandejs
PET
2010
Springer
13 years 12 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg
CHI
2008
ACM
14 years 8 months ago
The associative pda 2.0
In this paper I describe the Associative PDA 2.0, a mobile system for Personal Information Management (PIM), based on an associative information network. In addition to associate ...
Eileen Falke