Supporting a rich array of information sources is a key element to making highly mobile computing devices usable by the wider community. It is our belief that there will not be on...
Peter Hutterer, Mark T. Smith, John Ankcorn, Wayne...
As technology permeates more aspects of our everyday lives, greater demands are placed on information technology personnel. Lehigh University computing consultants have found thei...
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...