Sciweavers

1373 search results - page 56 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
CSE
2009
IEEE
13 years 12 months ago
Adapting Privacy-Preserving Computation to the Service Provider Model
There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue. One reason is that the business model of the application does not m...
Florian Kerschbaum
PERVASIVE
2005
Springer
14 years 2 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik
PERVASIVE
2005
Springer
14 years 2 months ago
Camera Phones with Pen Input as Annotation Devices
This paper explores the use of camera phones with pen input as a platform for generating digital annotations to realworld objects. We analyze the client-side requirements for a ge...
Michael Rohs, Christof Roduner
PERSUASIVE
2010
Springer
14 years 17 days ago
Activity-Based Micro-pricing: Realizing Sustainable Behavior Changes through Economic Incentives
Abstract. In this paper, we further develop the idea of combining pervasive computing techniques with electronic payment systems to create activity-based micro-incentives. Economic...
Tetsuo Yamabe, Vili Lehdonvirta, Hitoshi Ito, Hayu...
PERVASIVE
2005
Springer
14 years 2 months ago
Product Reviews in Mobile Decision Aid Systems
Recommender systems provide decision aid and information filtering functions that have a great potential application in the mobile context. An aspect which has not been extensive...
René T. A. Wietsma, Francesco Ricci