scispace - formally typeset
S

Sasu Tarkoma

Researcher at University of Helsinki

Publications -  400
Citations -  7944

Sasu Tarkoma is an academic researcher from University of Helsinki. The author has contributed to research in topics: Computer science & Mobile computing. The author has an hindex of 39, co-authored 355 publications receiving 6397 citations. Previous affiliations of Sasu Tarkoma include Helsinki University of Technology & Nokia.

Papers
More filters
Journal ArticleDOI

Privacy-preserving data sharing via probabilistic modelling

TL;DR: This work proposes formulating the problem of private data release through probabilistic modeling, and demonstrates empirically, in an epidemiological study, that statistical discoveries can be reliably reproduced from the synthetic data.
Proceedings Article

A Data Structure for Content-based Routing.

TL;DR: The experimental results indicate that the poset-derived forest performs considerably better than directed acyclic graph-based structures and is applicable for different filtering languages.
Proceedings ArticleDOI

Personal Device as a Controller for Interactive Surfaces: Usability and Utility of Different Connection Methods

TL;DR: Typing an URL is found to be the most usable method for initiating the connection between the smart phone and the large display surface and the difference in quality between the 3G and WiFi connections was deemed hardly noticeable.
Proceedings ArticleDOI

COSINE: Collaborator Selector for Cooperative Multi-Device Sensing and Computing

TL;DR: Developing COSINE as a novel approach for selecting collaborators in multi-device computing scenarios that identifies and recommends collaborators based on a novel information theoretic measure based on Markov trajectory entropy shows significant improvement in collaboration benefits.
Patent

Location information verification

TL;DR: In this paper, location information is provided with an authenticator in order to enable future providing of an authentication to a service or application making use of the location information, which is based on a cryptographic method known by a provider and recipient of and also optionally based on position data provided by location information.