Sciweavers

304 search results - page 45 / 61
» Trusted Computing in Mobile Action
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...
ATAL
2010
Springer
13 years 8 months ago
Distributed coordination of mobile agent teams: the advantage of planning ahead
We consider the problem of coordinating a team of agents engaged in executing a set of inter-dependent, geographically dispersed tasks in an oversubscribed and uncertain environme...
Laura Barbulescu, Zachary B. Rubinstein, Stephen F...
ACISP
2005
Springer
14 years 1 months ago
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management
Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
WEBI
2009
Springer
14 years 2 months ago
CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities
Information sharing is a key objective in the age of Internet and virtual communities. Reputation information is an important part of a user’s identity and is both a sensitive a...
Tal Grinshpoun, Nurit Gal-Oz, Amnon Meisels, Ehud ...
MOBISYS
2009
ACM
14 years 8 months ago
Point&Connect: intention-based device pairing for mobile phone users
Point&Connect (P&C) offers an intuitive and resilient device pairing solution on standard mobile phones. Its operation follows the simple sequence of point-and-connect: wh...
Chunyi Peng, Guobin Shen, Yongguang Zhang, Songwu ...