Showing 1 - 2 of 2
The idea of stealing cycles has been hyped for some years, boasting unlimited potential by tapping the computational power of millions of under utilized PCs connected to the Internet. Despite a few spectacular success stories (e.g. SETI@HOME), cycle-stealing is today not a widely used...
Persistent link: https://www.econbiz.de/10009437654
The extensive context information collection abilities of ubiquitous computing environments represent a significant threat to user privacy. In this paper we address this threat by introducing a context information privacy mechanism. Our approach relies on context-dependent ownership definitions...
Persistent link: https://www.econbiz.de/10009448585