Sciweavers

759 search results - page 83 / 152
» What Can Be Implemented Anonymously
Sort
View
CHI
2004
ACM
14 years 10 months ago
Context-sensitive design and human-centered interactive systems
Context is a critical element in forming the performance of interactive systems. As the functional diversity and range of use context of the system increase, context sensitivity b...
Keiichi Sato, Ken Douros
INFOCOM
2009
IEEE
14 years 4 months ago
Building Covert Channels over the Packet Reordering Phenomenon
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...
Adel El-Atawy, Ehab Al-Shaer
SEMWEB
2009
Springer
14 years 4 months ago
Towards Integrity Constraints in OWL
In many data-centric applications, it is desirable to use OWL as an expressive schema language with which one expresses constraints that must be satisfied by instance data. Howeve...
Evren Sirin, Jiao Tao
ICMCS
2007
IEEE
228views Multimedia» more  ICMCS 2007»
14 years 4 months ago
Dynamic Privacy in a Smart House Environment
— A smart house can be regarded as a surveillance environment in which the person being observed carries out activities that range from intimate to more public. What can be obser...
Simon Moncrieff, Svetha Venkatesh, Geoff A. W. Wes...
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
14 years 4 months ago
A Taxonomy for RFID
—Ben Clacy and Brian Jennings presented their recently published paper with the title of “service management: driving the future of IT” [1], which highlighted service oriente...
Taimur Hassan, Samir Chatterjee