Computing Now eNewsetter

 
 
 
   
 
IEEE COMPUTER SOCIETY
 
               21 June 2017
 
Computing Now
 
 
SECURITY AND PRIVACY
The Perils of User Tracking Using Zero-Permission Mobile Apps
Extensive simulations for 11 cities and real experiments for two cities show that a significant number of users are vulnerable to tracking by seemingly innocuous apps.
 
PERVASIVE COMPUTING
Noninvasive Bluetooth Monitoring of Visitors' Length of Stay at the Louvre
Visitor's behavior in the Louvre Museum is analyzed from datasets collected from Bluetooth sensors and examine visitors' length of stay in relationship to occupation density around artwork.
 
CLOUD COMPUTING
Trusting Cloud Service Providers: Trust Phases and a Taxonomy of Trust Factors
Before putting their trust in a cloud service provider, users need to be able to evaluate how trustworthy a service is based on many factors.
 
 
 
img-285-170
Advertisement
 
 
 
JOBS BOARD
 
 
 
COMPUTING EDGE
Advertise your branding and career opportunities to engage qualified candidates in the next industry publication.
 
 
 
TRAINING
Our TechLeader Training Program provides more than 15,000 resources needed to quickly and inexpensively train your employees.
 
 
 
Advertisement
 
 
MEMBERSHIP
Introducing memberships to fit your career goals.
 
 
 
ROCK STAR EVENT
Technology Events that open your mind to the future.
 
 
 
CONFERENCES
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)
 
 
 
WEBINAR
When Cloud Recovery Will Save the Day…and When it Won’t.
 
 
 
Advertisement
© 2017 IEEE Computer Society
Contact Us | Privacy
F   TW   LI   YT   G+  
 
IEEE

Click here to unsubscribe from ALL IEEE Computer Society communications.
 
10662 Los Vaqueros Circle, Los Alamitos, CA 90720