Sciweavers

181 search results - page 21 / 37
» Using User Preferences to Enhance Privacy in Pervasive Syste...
Sort
View
ESORICS
2004
Springer
14 years 1 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
PERVASIVE
2005
Springer
14 years 1 months ago
A Conceptual Framework for Camera Phone-Based Interaction Techniques
This paper proposes and evaluates interaction techniques for camera-equipped mobile phones. The proposed techniques are based on a visual code system that provides a number of orie...
Michael Rohs, Philipp Zweifel
ATAL
2009
Springer
14 years 2 months ago
Producing timely recommendations from social networks through targeted search
There has been a significant increase in interest and participation in social networking websites recently. For many users, social networks are indispensable tools for sharing pe...
Anil Gürsel, Sandip Sen
PERVASIVE
2006
Springer
13 years 8 months ago
A Practical Approach to Recognizing Physical Activities
We are developing a personal activity recognition system that is practical, reliable, and can be incorporated into a variety of health-care related applications ranging from person...
Jonathan Lester, Tanzeem Choudhury, Gaetano Borrie...
DIM
2005
ACM
13 years 10 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...