Triandopoulos, N., M. T. Goodrich, D. Nguyen, O. Ohrimenko, C. Papamanthou, R. Tamassia, and C. Videira Lopes,
Techniques for verifying search results over a distributed collection,
, no. US 13/731,885, October 6, 2015.
Troshynski, E., C. Lee, and P. Dourish,
"Accountabilities of Presence: Reframing Location-Based Systems",
ACM Conf. on Human Factors in Computing Systems (CHI 2008), Florence, Italy, pp. 487-496, April 5-10, 2008.
Tsudik, G., M. Burmester, A. Juels, A. Kobsa, D. Molnar, R. Di Pietro, and M. Rieback,
"RFID Security and Privacy: Long-term Research or Short-term Tinkering? Invited Paper",
First ACM Conference on Wireless Network Security (WiSec '08), Alexandria, VA, pp. 160, March 31-April 2, 2008.
Turner, C., and D. J. Richardson,
"Software Control and Strict Products Liability: A Technical Challenge to Current Legal Notion of Responsibility",
IASTED International Conference Law and Technology (LAWTECH 2000), San Francisco, California, November, 2000.