Sciweavers

1018 search results - page 90 / 204
» Remote User Authentication Using Public Information
Sort
View
HUC
2010
Springer
13 years 9 months ago
Exploring end user preferences for location obfuscation, location-based services, and the value of location
Long-term personal GPS data is useful for many UbiComp services such as traffic monitoring and environmental impact assessment. However, inference attacks on such traces can revea...
A. J. Bernheim Brush, John Krumm, James Scott
INTERACT
2003
13 years 9 months ago
Constructed Narratives: Using Play to Breakdown Social
: Constructed Narratives is both a human computer interaction research project and interactive art exploration that demonstrates methods by which rigorous research and aesthetic an...
Pamela Jennings
ICPR
2002
IEEE
14 years 9 months ago
Hiding a Face in a Fingerprint Image
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. We present...
Anil K. Jain, Umut Uludag, Rein-Lien Hsu
CONCURRENCY
2008
112views more  CONCURRENCY 2008»
13 years 8 months ago
Building and applying geographical information system Grids
: We discuss the development and application of Web Service-based Geographical Information System Grids. Following the WS-I+ approach of building Grids on Web Service standards, we...
Galip Aydin, Ahmet Sayar, Harshawardhan Gadgil, Me...
CHI
2007
ACM
14 years 2 days ago
Capturing, sharing, and using local place information
With new technology, people can share information about everyday places they go; the resulting data helps others find and evaluate places. Recent applications like Dodgeball and S...
Pamela J. Ludford, Reid Priedhorsky, Ken Reily, Lo...