One of the most compelling social questions, which until now was left unanswered by current technology, is "Who's that?" This question is usually asked about a new ...
Aaron Beach, Mike Gartrell, Sirisha Akkala, Jack E...
Preserving one's uniquely customized computing environment as one moves to different locations is an enduring challenge in mobile computing. We examine why this capability is...
Mahadev Satyanarayanan, Michael Kozuch, Casey Helf...
Ensuring personal safety for people on the move is becoming a heightened priority in today's uncertain environment. Traditional approaches are no longer adequate in meeting ri...
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Distributed applications involving mobile devices interconnected by wireless networks may benefit both from multiagent technology and context-aware programming techniques. This ar...