Sciweavers

759 search results - page 15 / 152
» What Can Be Implemented Anonymously
Sort
View
CHI
2002
ACM
14 years 10 months ago
What is that?: gesturing to determine device identity
Computing devices can seamlessly recognize one another as they join and leave a wireless network, but users often experience difficulty identifying a desired device from a continu...
Colin Swindells, Kori M. Inkpen
SIGCSE
2006
ACM
119views Education» more  SIGCSE 2006»
14 years 3 months ago
Practice what you preach: full separation of concerns in CS1/CS2
We argue that the failure to separate the concerns in CS1 is the leading cause of difficulty in teaching OOP in the first year. We show how the concerns can be detangled and prese...
Hamzeh Roumani
ICRA
2005
IEEE
124views Robotics» more  ICRA 2005»
14 years 3 months ago
What Are the Ants Doing? Vision-Based Tracking and Reconstruction of Control Programs
— In this paper, we study the problem of going from a real-world, multi-agent system to the generation of control programs in an automatic fashion. In particular, a computer visi...
Magnus Egerstedt, Tucker R. Balch, Frank Dellaert,...
SIGCOMM
2010
ACM
13 years 10 months ago
Privacy-preserving P2P data sharing with OneSwarm
Privacy--the protection of information from unauthorized disclosure--is increasingly scarce on the Internet, and yet increasingly important as every user becomes both a content co...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
14 years 3 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...