The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2011). PerCom-Workshops 2011: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops 2011)
In tactical military networks, decisions must often be made quickly based on information at hand. It is a challenge to provide decision makers with a notion of the quality of the information they have, or to provide a method by which decision makers can specify a required quality of information. It is a further challenge to honor requests for a required quality of information when selecting information...
Current trust models for social networks commonly rely on explicit voting mechanisms where individuals vote for each other as a form of trust statement. However, there is a wealth of information about individuals beyond trust voting in emerging web based social networks. Incorporating sources of evidence into trust models for social networks has not been studied to date. We explore a trust model for...
The number of receivable TV channels has highly increased in recent years. Handling the enormous offer of TV content could be a challenge for the users in case of selecting the most interesting program. Furthermore, most users only focus on their favorite TV channels. That's the reason why content on other channels won't be recognized. For this problem assistive systems and tools are desirable to...
Pervasive computing environments comprise a myriad of devices. In this framework, interactions take place between different parties to simplify users' everyday life in a natural and transparent manner. These interactions, that are generally oriented to the delivery of services, usually involve the exchange of identity information and personal data over the networks. Since transactions may occur between...
We study inference attacks that can be launched via the extension API of Facebook. We explain the threat of these attacks through a reduction to authentication attacks, devise a taxonomy for such attacks, and propose a risk metric to help subscribers of third-party applications refine their privacy expectations.
This is a case study that focuses on design methods developed by a computer engineer engaged in an interdisciplinary design project with a classic designer. Of interest is how the computer engineer initially found the task of achieving the shared design goals to be almost impossible, primarily due to the differences between the codified design methods of the engineer, and the tacit knowledge based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.