ISR Bibliography

Export 54 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Triandopoulos, N., M. T. Goodrich, D. Nguyen, O. Ohrimenko, C. Papamanthou, R. Tamassia, and C. Videira Lopes, Techniques for verifying search results over a distributed collection, , no. US 13/731,885, October 6, 2015.
Troshynski, E., C. Lee, and P. Dourish, "Accountabilities of Presence: Reframing Location-Based Systems", ACM Conf. on Human Factors in Computing Systems (CHI 2008), Florence, Italy, pp. 487-496, April 5-10, 2008.
Tsudik, G., M. Burmester, A. Juels, A. Kobsa, D. Molnar, R. Di Pietro, and M. Rieback, "RFID Security and Privacy: Long-term Research or Short-term Tinkering? Invited Paper", First ACM Conference on Wireless Network Security (WiSec '08), Alexandria, VA, pp. 160, March 31-April 2, 2008.
Turner, C., and D. J. Richardson, "Software Control and Strict Products Liability: A Technical Challenge to Current Legal Notion of Responsibility", IASTED International Conference Law and Technology (LAWTECH 2000), San Francisco, California, November, 2000.