Sciweavers

1018 search results - page 155 / 204
» Remote User Authentication Using Public Information
Sort
View
CHI
2004
ACM
14 years 8 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
WWW
2010
ACM
14 years 2 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
SIGMETRICS
2005
ACM
100views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
On AS-level path inference
The ability to discover the AS-level path between two end-points is valuable for network diagnosis, performance optimization, and reliability enhancement. Virtually all existing t...
Zhuoqing Morley Mao, Lili Qiu, Jia Wang, Yin Zhang
ACMDIS
2006
ACM
14 years 1 months ago
The spatial character of sensor technology
By considering the spatial character of sensor-based interactive systems, this paper investigates how discussions of seams and seamlessness in ubiquitous computing neglect the com...
Stuart Reeves, Tony P. Pridmore, Andy Crabtree, Jo...
IROS
2008
IEEE
135views Robotics» more  IROS 2008»
14 years 2 months ago
Interactive learning of visual topological navigation
— We present a topological navigation system that is able to visually recognize the different rooms of an apartment and guide a robot between them. Specifically tailored for sma...
David Filliat