Sciweavers

1018 search results - page 170 / 204
» Remote User Authentication Using Public Information
Sort
View
HICSS
2005
IEEE
150views Biometrics» more  HICSS 2005»
14 years 1 months ago
Collaborative Authoring on the Web: A Genre Analysis of Online Encyclopedias
This paper presents the results of a genre analysis of two web-based collaborative authoring environments, Wikipedia and Everything2, both of which are intended as repositories of...
William G. Emigh, Susan C. Herring
ACMDIS
2004
ACM
14 years 1 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
COMSWARE
2006
IEEE
14 years 1 months ago
WLAN location sharing through a privacy observant architecture
Abstract— In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links...
Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva...
ISTA
2004
13 years 9 months ago
A Conceptual Modeling Technique Based on Semantically Complete Model, Its Applications
: The article proposes a conceptual modeling technique based on Semantically Complete model, the main property of which is that relations carry complete information about interconn...
Vladimir Ovchinnikov
EDBTW
2010
Springer
14 years 2 months ago
Quantile-based bootstrap methods to generate continuous synthetic data
To face the increasing demand from users, National Statistical Institutes (NSI) release different information products. The dissemination of this information should be performed ...
Daniela Ichim