-
1
-
-
33750083406
-
Reminding ABOUT Tagged Objects Using Passive RFIDs
-
Proc. Ubiquitous Computing 6th Int'l Conf, Ubicomp 04, Springer
-
G. Borriello et al., "Reminding ABOUT Tagged Objects Using Passive RFIDs," Proc. Ubiquitous Computing 6th Int'l Conf. (Ubicomp 04), LNCS 3205, Springer, 2004, pp. 36-53.
-
(2004)
LNCS
, vol.3205
, pp. 36-53
-
-
Borriello, G.1
-
2
-
-
33845303529
-
Fine-Grained Activity Recognition by Aggregating
-
Abstract Object Usage, IEEE CS Press
-
D. Patterson et al., "Fine-Grained Activity Recognition by Aggregating Abstract Object Usage," Proc. 9th Int'l Symp. Wearable Computers (ISWC 05), IEEE CS Press, 2005, pp. 44-51.
-
(2005)
Proc. 9th Int'l Symp. Wearable Computers (ISWC 05)
, pp. 44-51
-
-
Patterson, D.1
-
4
-
-
33144457479
-
RFID Security and Privacy: A Research Survey
-
Feb
-
A. Juels, "RFID Security and Privacy: A Research Survey," IEEE J. Selected Areas in Communications, Feb. 2006, pp. 381-395.
-
(2006)
IEEE J. Selected Areas in Communications
, pp. 381-395
-
-
Juels, A.1
-
6
-
-
84861294968
-
Privacy and Proportionality: Adapting Legal Evaluation Techniques to Inform Design in Ubiquitous Computing
-
ACM Press
-
G. Iachello et al., "Privacy and Proportionality: Adapting Legal Evaluation Techniques to Inform Design in Ubiquitous Computing," Proc. SIGCHI Conf. Human Factors in Computing Systems, ACM Press, 2005, pp. 91-100.
-
(2005)
Proc. SIGCHI Conf. Human Factors in Computing Systems
, pp. 91-100
-
-
Iachello, G.1
-
8
-
-
35348854758
-
-
S. Intille et al., New Challenges for Privacy Law: Wearable Computers that Create Electronic Digital Diaries, tech. report, MIT Dept. of Architecture House_n, Sept. 2003.
-
S. Intille et al., New Challenges for Privacy Law: Wearable Computers that Create Electronic Digital Diaries, tech. report, MIT Dept. of Architecture House_n, Sept. 2003.
-
-
-
-
9
-
-
0041783510
-
Privacy-Preserving Data Mining
-
R. Agrawal et al., "Privacy-Preserving Data Mining," ACM SIGMOD Record, vol. 29, no. 2,2000, pp. 439-450.
-
(2000)
ACM SIGMOD Record
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
-
10
-
-
0036811662
-
K-Anonymity: A Model for Protecting Privacy
-
L. Sweeney, "K-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, 2002, pp. 557-570.
-
(2002)
Int'l J. Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
12
-
-
19944367736
-
Personal Privacy through Understanding and Action
-
S. Lederer et al., "Personal Privacy through Understanding and Action," Personal Ubiquitous Computing, vol. 8, no. 6, 2004, pp. 440-454.
-
(2004)
Personal Ubiquitous Computing
, vol.8
, Issue.6
, pp. 440-454
-
-
Lederer, S.1
-
13
-
-
84945556728
-
Privacy by Design: Principles of Privacy-Aware Ubiquitous Systems
-
Proc. Ubiquitous Computing 3rd Int'l Conf, Ubicornp 01, Springer
-
M. Langheinrich, "Privacy by Design: Principles of Privacy-Aware Ubiquitous Systems," Proc. Ubiquitous Computing 3rd Int'l Conf. (Ubicornp 01), LNCS 2201, Springer, 2001, pp. 273-291.
-
(2001)
LNCS
, vol.2201
, pp. 273-291
-
-
Langheinrich, M.1
-
14
-
-
35348905266
-
Protecting User Data in Ubiquitous Computing
-
Privacy Enhancing Technologies, Springer
-
Y. Duan and J. Canny, "Protecting User Data in Ubiquitous Computing," Privacy Enhancing Technologies, LNCS 3424, Springer, 2004, pp. 273-291.
-
(2004)
LNCS
, vol.3424
, pp. 273-291
-
-
Duan, Y.1
Canny, J.2
-
15
-
-
3142702944
-
Extending Query Rewriting Techniques for Fine-Grained Access Control
-
ACM Press
-
S. Rizvi et al., "Extending Query Rewriting Techniques for Fine-Grained Access Control," Proc. SIGMOD, ACM Press, 2004, pp. 551-562.
-
(2004)
Proc. SIGMOD
, pp. 551-562
-
-
Rizvi, S.1
-
16
-
-
33745860463
-
Design and Experimental Analysis of Continuous Location Tracking Techniques for Wizard of Oz Testing
-
ACM Press
-
Y. Li et al., "Design and Experimental Analysis of Continuous Location Tracking Techniques for Wizard of Oz Testing," Proc. SIGCHI Conf. Human Factors in Computing Systems, ACM Press, 2006, pp. 1019-1022.
-
(2006)
Proc. SIGCHI Conf. Human Factors in Computing Systems
, pp. 1019-1022
-
-
Li, Y.1
-
17
-
-
35348867810
-
-
tech. report UW-CSE-07-03-01, Univ. of Washington, Computer Science and Engineering Dept, Mar
-
N. Khoussainova et al., "Probabilistic RFID Data Management," tech. report UW-CSE-07-03-01, Univ. of Washington, Computer Science and Engineering Dept., Mar. 2007.
-
(2007)
Probabilistic RFID Data Management
-
-
Khoussainova, N.1
-
18
-
-
4544259863
-
An Architecture for PrivacySensitive Ubiquitous Computing
-
ACM Press
-
J. Hong et al., " An Architecture for PrivacySensitive Ubiquitous Computing," Proc. Mobisys, ACM Press, 2004, pp. 177-189.
-
(2004)
Proc. Mobisys
, pp. 177-189
-
-
Hong, J.1
-
20
-
-
33745842288
-
Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real World
-
ACM Press
-
G. Iachello et al., "Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real World," Proc. SIGCHI Conf. Human Factors in Computing Systems, ACM Press, 2006, pp. 1009-1018.
-
(2006)
Proc. SIGCHI Conf. Human Factors in Computing Systems
, pp. 1009-1018
-
-
Iachello, G.1
-
22
-
-
38049003038
-
Virtual Walls
-
Proc. Pervasive, Springer, May
-
A. Kapadia et al., "Virtual Walls," Proc. Pervasive, LNCS 4480, Springer, May 2007, pp. 162-179.
-
(2007)
LNCS
, vol.4480
, pp. 162-179
-
-
Kapadia, A.1
|