Sciweavers

345 search results - page 51 / 69
» When Systems Loose their Identity
Sort
View
CHI
2007
ACM
14 years 10 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
CHI
2004
ACM
14 years 10 months ago
Mouse and touchscreen selection in the upper and lower visual fields
Neuroanatomical evidence indicates the human eye's visual field can be functionally divided into two vertical hemifields, each specialized for specific functions. The upper v...
Barry A. Po, Brian D. Fisher, Kellogg S. Booth
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 4 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
14 years 4 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
SRDS
2008
IEEE
14 years 4 months ago
SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks
In many reliable Wireless Sensor Network (WSN) applications, messages have different priorities depending on urgency or importance. For example, a message reporting the failure of...
Vinaitheerthan Sundaram, Saurabh Bagchi, Yung-Hsia...