The New York Times / IEEE Computer / Gnome Press / IEEE Intelligent Systems / Google / IEEE Intl. / 15th IEEE Intl / Designing Interactive Systems / Las Vegas NV / Designing Privacy-Sensitive Ubiquitous Computing Systems / Eleventh Intl / Intel / The Guardian / Associated Press / /
Country
United States / /
Currency
USD / / /
Event
Product Issues / /
Facility
University of Washington Paul G. Allen Center Box / TCP port / /
IndustryTerm
household products / wireless home network / ubiquitous computing / wireless network / robot products / wireless trace / console software / wireless communications / compromised devices / ad hoc network / robotic systems / securityconscious products / security technologies / web interface / search engines / cyber-physical systems / ad hoc wireless network / ubiquitous computing applications / wireless mode / communication protocols / home wireless network / e - commerce / console software version / wireless packets / schedule algorithm / wireless range / wireless communication method / remote Internet / /
Movie
D. V / /
MusicAlbum
High / Low / /
OperatingSystem
Microsoft Windows / /
Organization
University of Washington / National Science Foundation / /
Person
Karl Koscher / Tim Kindberg / Hal Perkins / Yuri Kageyama / Cynthia Matuszek / Johnny Can / Tadayoshi Kohno / Detectable / Joshua R. Smith / /
Position
speaker / system administrator for the home environment / Author / spy / designer / representative / D. R. Butcher / /
Product
hearing / /
PublishedMedium
The Guardian / Consumer Reports / IEEE Intelligent Systems / The New York Times / /
Technology
home network / WEP / network using WPA encryption / Information Technology / wireless communications / MAC address / html / 128-bit encryption / encryption / security technologies / Cryptography / key schedule algorithm / networks using WEP encryption / artificial intelligence / WPA encryption / communication protocols / /