Sciweavers

17932 search results - page 3433 / 3587
» Wireless communications systems
Sort
View
WWW
2011
ACM
13 years 5 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
HOTNETS
2010
13 years 5 months ago
A case for information-bound referencing
Links and content references form the foundation of the way that users interact today. Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol...
Ashok Anand, Aditya Akella, Vyas Sekar, Srinivasan...
IHI
2010
106views Healthcare» more  IHI 2010»
13 years 5 months ago
Identifying opportunities for inpatient-centric technology
The evolution from a disease-centered model of care to a more patient-centered model presents opportunities for going beyond designing technology to support medical professionals ...
Meredith M. Skeels, Desney S. Tan
ITIIS
2010
200views more  ITIIS 2010»
13 years 5 months ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee
JDCTA
2010
118views more  JDCTA 2010»
13 years 5 months ago
Shoppers' Experiences of Digital Signage-a Cross-National Qualitative Study
Digital signage, sometimes known as a Digital Communications Network (DCN) or private plasma screen network, has been little researched to date. This paper puts forward the view t...
Andrew Newman, Charles Dennis, Len-Tiu Wright, Tam...
« Prev « First page 3433 / 3587 Last » Next »