-
1
-
-
33847011964
-
Cerberus: A context-aware security scheme for smart spaces
-
Al-Muhtadi, J., Ranganathan, A., Campbell, R., and Mickunas, M. Cerberus: A context-aware security scheme for smart spaces. In Proceedings of the First IEEE Conference on Pervasive Computing and Communications (2003).
-
(2003)
Proceedings of the First IEEE Conference on Pervasive Computing and Communications
-
-
Al-Muhtadi, J.1
Ranganathan, A.2
Campbell, R.3
Mickunas, M.4
-
3
-
-
35348834249
-
Privacy in location-aware computing environments
-
Anthony, D., Henderson, T., and Kotz, D. Privacy in location-aware computing environments. IEEE Pervasive Computing 6, 4 (2007).
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
-
-
Anthony, D.1
Henderson, T.2
Kotz, D.3
-
4
-
-
14644422552
-
Beyond pixels: Exploiting camera metadata for photo classification
-
June
-
Boutell, M., and Luo, J. Beyond pixels: Exploiting camera metadata for photo classification. Pattern Recognition 38, 6 (June 2005), 935-946.
-
(2005)
Pattern Recognition
, vol.38
, Issue.6
, pp. 935-946
-
-
Boutell, M.1
Luo, J.2
-
8
-
-
84861295423
-
Location disclosure to social relations: Why, when, & what people want to share
-
Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2005).
-
(2005)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
-
-
Consolvo, S.1
Smith, I.2
Matthews, T.3
LaMarca, A.4
Tabert, J.5
Powledge, P.6
-
9
-
-
84859919898
-
Reconstructing the past: Personal memory technologies are not just personal and not just for memory
-
Crete-Nishihata, M., Baecker, R., Massimi, M., Ptak, D., Campigotto, R., Kaufman, L., Brickman, A., Turner, G., Steinerman, J., and Black, S. Reconstructing the past: personal memory technologies are not just personal and not just for memory. Human-Computer Interaction 27, 1-2 (2012).
-
(2012)
Human-Computer Interaction
, vol.27
, Issue.1-2
-
-
Crete-Nishihata, M.1
Baecker, R.2
Massimi, M.3
Ptak, D.4
Campigotto, R.5
Kaufman, L.6
Brickman, A.7
Turner, G.8
Steinerman, J.9
Black, S.10
-
13
-
-
77953759665
-
Developing privacy guidelines for social location disclosure applications and services
-
Iachello, G., Smith, I., Consolvo, S., Chen, M., and Abowd, G. D. Developing privacy guidelines for social location disclosure applications and services. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (2005), 65-76.
-
(2005)
Proceedings of the Symposium on Usable Privacy and Security (SOUPS)
, pp. 65-76
-
-
Iachello, G.1
Smith, I.2
Consolvo, S.3
Chen, M.4
Abowd, G.D.5
-
17
-
-
84992684750
-
Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments
-
Mann, S., Nolan, J., and Wellman, B. Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & Society 1, 3 (2003).
-
(2003)
Surveillance & Society
, vol.1
, Issue.3
-
-
Mann, S.1
Nolan, J.2
Wellman, B.3
-
18
-
-
84866497422
-
Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application
-
Miluzzo, E., Lane, N., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S., Zheng, X., and Campbell, A. Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys) (2008).
-
(2008)
Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys)
-
-
Miluzzo, E.1
Lane, N.2
Fodor, K.3
Peterson, R.4
Lu, H.5
Musolesi, M.6
Eisenman, S.7
Zheng, X.8
Campbell, A.9
-
20
-
-
70450186023
-
Encountering SenseCam: Personal recording technologies in everyday life
-
Nguyen, D., Marcu, G., Hayes, G., Truong, K., Scott, J., Langheinrich, M., and Roduner, C. Encountering SenseCam: Personal recording technologies in everyday life. In Proceedings of the 11th International Conference on Ubiquitous Computing (UbiComp) (2009).
-
(2009)
Proceedings of the 11th International Conference on Ubiquitous Computing (UbiComp)
-
-
Nguyen, D.1
Marcu, G.2
Hayes, G.3
Truong, K.4
Scott, J.5
Langheinrich, M.6
Roduner, C.7
-
22
-
-
79958159107
-
Lifelogging: Privacy and empowerment with memories for life
-
O'Hara, K., Tuffield, M., and Shadbolt, N. Lifelogging: Privacy and empowerment with memories for life. Identity in the Information Society 1, 1 (2008), 155-172.
-
(2008)
Identity in the Information Society
, vol.1
, Issue.1
, pp. 155-172
-
-
O'Hara, K.1
Tuffield, M.2
Shadbolt, N.3
-
23
-
-
84868374539
-
My privacy policy: Exploring end-user specification of free-form location access rules
-
vol. 7398 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg (Feb)
-
Patil, S., Gall, Y. L., Lee, A. J., and Kapadia, A. My privacy policy: Exploring end-user specification of free-form location access rules. In Proceedings of the Workshop on Usable Security (USEC), vol. 7398 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg (Feb. 2012), 86-97.
-
(2012)
Proceedings of the Workshop on Usable Security (USEC)
, pp. 86-97
-
-
Patil, S.1
Gall, Y.L.2
Lee, A.J.3
Kapadia, A.4
-
24
-
-
84864974894
-
Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice
-
Patil, S., Norcie, G., Kapadia, A., and Lee, A. Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS) (2012).
-
(2012)
Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS)
-
-
Patil, S.1
Norcie, G.2
Kapadia, A.3
Lee, A.4
-
25
-
-
33745878837
-
Need to know:" examining information need in location discourse
-
Reilly, D., Dearman, D., Ha, V., Smith, I., and Inkpen, K. "Need to know:" examining information need in location discourse. In Proceedings of the 4th International Conference on Pervasive Computing (PERVASIVE) (2006).
-
(2006)
Proceedings of the 4th International Conference on Pervasive Computing (PERVASIVE)
-
-
Reilly, D.1
Dearman, D.2
Ha, V.3
Smith, I.4
Inkpen, K.5
-
26
-
-
84911198048
-
Deepface: Closing the gap to human-level performance in face verification
-
Taigman, Y., Yang, M., Ranzato, M., and Wolf, L. Deepface: Closing the gap to human-level performance in face verification. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2014).
-
(2014)
IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
-
-
Taigman, Y.1
Yang, M.2
Ranzato, M.3
Wolf, L.4
-
27
-
-
84907397922
-
PlaceAvoider: Steering first-person cameras away from sensitive spaces
-
Templeman, R., Korayem, M., Crandall, D., and Kapadia, A. PlaceAvoider: Steering first-person cameras away from sensitive spaces. In 21st Annual Network and Distributed System Security Symposium (NDSS) (2014).
-
(2014)
21st Annual Network and Distributed System Security Symposium (NDSS)
-
-
Templeman, R.1
Korayem, M.2
Crandall, D.3
Kapadia, A.4
-
28
-
-
85180406770
-
PlaceRaider: Virtual theft in physical spaces with smartphones
-
Templeman, R., Rahman, Z., Crandall, D., and Kapadia, A. PlaceRaider: Virtual theft in physical spaces with smartphones. In Proceedings of The 20th Annual Network and Distributed System Security Symposium (NDSS) (2013).
-
(2013)
Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Templeman, R.1
Rahman, Z.2
Crandall, D.3
Kapadia, A.4
-
29
-
-
84885956230
-
Organization and exploration of heterogeneous personal data collected in daily life
-
Teraoka, T. Organization and exploration of heterogeneous personal data collected in daily life. Human-centric Computing and Information Sciences 2, 1 (2012).
-
(2012)
Human-centric Computing and Information Sciences
, vol.2
, Issue.1
-
-
Teraoka, T.1
-
30
-
-
84885205819
-
Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras
-
Thomaz, E., Parnami, A., Bidwell, J., Essa, I., and Abowd, G. Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitious Computing (UbiComp) (2013), 739-748.
-
(2013)
Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitious Computing (UbiComp)
, pp. 739-748
-
-
Thomaz, E.1
Parnami, A.2
Bidwell, J.3
Essa, I.4
Abowd, G.5
-
31
-
-
78649999355
-
Locaccino: A privacy-centric location sharing application
-
Toch, E., Cranshaw, J., Hankes-Drielsma, P., Springfield, J., Kelley, P. G., Cranor, L., Hong, J., and Sadeh, N. Locaccino: A privacy-centric location sharing application. In Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing, UbiComp '10 Adjunct (2010).
-
(2010)
Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing, UbiComp '10 Adjunct
-
-
Toch, E.1
Cranshaw, J.2
Hankes-Drielsma, P.3
Springfield, J.4
Kelley, P.G.5
Cranor, L.6
Hong, J.7
Sadeh, N.8
-
32
-
-
84893115243
-
Privacy nudges for social media: An exploratory facebook study
-
Wang, Y., Leon, P., Scott, K., Chen, X., Acquisti, A., and Cranor, L. Privacy nudges for social media: An exploratory facebook study. In Proceedings of the International Conference on World Wide Web (WWW) (2013).
-
(2013)
Proceedings of the International Conference on World Wide Web (WWW)
-
-
Wang, Y.1
Leon, P.2
Scott, K.3
Chen, X.4
Acquisti, A.5
Cranor, L.6
|