Institution
Hewlett-Packard
Company•Palo Alto, California, United States•
About: Hewlett-Packard is a company organization based out in Palo Alto, California, United States. It is known for research contribution in the topics: Signal & Substrate (printing). The organization has 34663 authors who have published 59808 publications receiving 1467218 citations. The organization is also known as: Hewlett Packard & Hewlett-Packard Company.
Papers published on a yearly basis
Papers
More filters
••
[...]
TL;DR: It is found with great significance that a linear relationship exists between an individual's belief about a trait and the value he or she places on it, and the less desirable the trait, the greater the price a person demands for releasing the information.
Abstract: In several experimental auctions, participants put a dollar value on private information before revealing it to a group. An analysis of results show that a trait's desirability in relation to the group played a key role in the amount people demanded to publicize private information. Because people can easily obtain, aggregate, and disperse personal data electronically, privacy is a central concern in the information age. This concern is clear in relation to financial data and genetic information, both of which can lead to identity abuse and discrimination. However, other relatively harmless information can also be abused, including a person's gender, salary, age, marital status, or shopping preferences. What's unclear is whether it's the fear of such abuse that actually causes people's stated hesitance to reveal their data. Our hypothesis - and the motivation for our study - is that people reveal information when they feel that they're somewhat typical or positively atypical compared to the target group. To test this hypothesis, we conducted experiments that elicit the value people place on their private data. We found, with great significance (more than 95 percent statistical confidence) that a linear relationship exists between an individual's belief about a trait and the value he or she places on it. That is, the less desirable the trait, the greater the price a person demands for releasing the information. Furthermore, we found that small deviations in a socially positive direction are associated with a lower asking price.
217 citations
••
24 Apr 1994217 citations
•
17 Dec 1998TL;DR: A scalable printhead is formed by mounting an ink manifold and multiple thermal inkjet printhead dies to a carrier substrate as discussed by the authors, which is machined to include through-slots.
Abstract: An inkjet printing system includes a scalable printhead with an ink manifold. The scalable printhead is formed by mounting an ink manifold and multiple thermal inkjet printhead dies to a carrier substrate. The carrier substrate is machined to include through-slots. There is a through-slot for each refill slot among the multiple printhead dies. A first end of a given through-slot connects to a refill slot of a corresponding printhead die. An opposite, second end of the through-slot connects to the ink manifold. The ink manifold includes an inlet for coupling to an ink supply reservoir. The ink manifold also includes one or more channels and a plurality of feed openings. Each feed opening connects to a printhead die refill slot by way of a substrate through-slot.
217 citations
•
02 Jun 1994TL;DR: In this article, the authors propose a secure authentication and transaction message exchange protocol between IC cards and a remote terminal at a private location, relying on the IC card and the remote terminal for message security.
Abstract: A terminal (30) for carrying out at a private location a transaction consisting of alteration of a token value stored in an IC card (12) issued to a cardholder via an on-line transaction session with an operatively compatible terminal at a remote location. The private terminal (30) establishes data links with the IC card (12) and the remote terminal (30) and passes secure authentication and transaction messages between them via these data links, relying on the IC card (12) and the remote terminal (30) for message security.
217 citations
••
24 Jun 2007TL;DR: This paper proposes a signature scheme for network coding that makes use of the linearity property of the packets in a coded system, and allows nodes to check the integrity of the packet received easily, and shows that the proposed scheme is secure, and its overhead is negligible for large files.
Abstract: Recent research has shown that network coding can be used in content distribution systems to improve the speed of downloads and the robustness of the systems. However, such systems are very vulnerable to attacks by malicious nodes, and we need to have a signature scheme that allows nodes to check the validity of a packet without decoding. In this paper, we propose such a signature scheme for network coding. Our scheme makes use of the linearity property of the packets in a coded system, and allows nodes to check the integrity of the packets received easily. We show that the proposed scheme is secure, and its overhead is negligible for large files.
217 citations
Authors
Showing all 34676 results
Name | H-index | Papers | Citations |
---|---|---|---|
Andrew White | 149 | 1494 | 113874 |
Stephen R. Forrest | 148 | 1041 | 111816 |
Rafi Ahmed | 146 | 633 | 93190 |
Leonidas J. Guibas | 124 | 691 | 79200 |
Chenming Hu | 119 | 1296 | 57264 |
Robert E. Tarjan | 114 | 400 | 67305 |
Hong-Jiang Zhang | 112 | 461 | 49068 |
Ching-Ping Wong | 106 | 1128 | 42835 |
Guillermo Sapiro | 104 | 667 | 70128 |
James R. Heath | 103 | 425 | 58548 |
Arun Majumdar | 102 | 459 | 52464 |
Luca Benini | 101 | 1453 | 47862 |
R. Stanley Williams | 100 | 605 | 46448 |
David M. Blei | 98 | 378 | 111547 |
Wei-Ying Ma | 97 | 464 | 40914 |