Sciweavers

78 search results - page 8 / 16
» Who are you
Sort
View
ICDCS
2011
IEEE
12 years 7 months ago
SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones
Abstract—Nowadays companies increasingly aggregate location data from different sources on the Internet to offer locationbased services such as estimating current road traffic c...
Daniele Quercia, Ilias Leontiadis, Liam McNamara, ...
CRYPTO
2007
Springer
130views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Reducing Trust in the PKG in Identity Based Cryptosystems
One day, you suddenly find that a private key corresponding to your Identity is up for sale at e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is...
Vipul Goyal
IWC
2010
132views more  IWC 2010»
13 years 6 months ago
Audio makes a difference in haptic collaborative virtual environments
In this paper a study is presented which aimed at exploring the effects of audio feedback in a haptic and visual interface supporting collaboration among sighted and people who ca...
Jonas Moll, Yingying Huang, Eva-Lotta Sallnäs
IEEEMM
2000
120views more  IEEEMM 2000»
13 years 7 months ago
Gaze Awareness for Video-Conferencing: A Software Approach
reness has more abstract social value: People who use frequent eye contact are perceived as more attentive, friendly, cooperative, confident, mature, and sincere than those who avo...
Jim Gemmell, Kentaro Toyama, C. Lawrence Zitnick, ...
ICRE
2000
IEEE
14 years 2 days ago
Requirements Documentation: Why a Formal Basis is Essential
Unless you have a complete and precise description of your product’s requirements, it is very unlikely that you will satisfy those requirements. A requirements document that is ...
David Lorge Parnas