Sciweavers

123 search results - page 10 / 25
» Cocktail Party on the Mobile
Sort
View
CN
2007
124views more  CN 2007»
13 years 6 months ago
Cryptographic techniques for mobile ad-hoc networks
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
PERCOM
2005
ACM
14 years 6 months ago
A Privacy Enhanced Service Architecture for Mobile Users
Location, presence and messaging services provide the essential ingredients for emerging information and communications services. Nevertheless, the users are concerned about revea...
Sandford Bessler, Oliver Jorns
UIST
2005
ACM
14 years 8 days ago
Physical embodiments for mobile communication agents
This paper describes a physically embodied and animated user interface to an interactive call handling agent, consisting of a small wireless animatronic device in the form of a sq...
Stefan Marti, Chris Schmandt
ISSRE
2003
IEEE
14 years 4 hour ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
CHI
2004
ACM
14 years 7 months ago
Dealing with mobile conversations in public places: some implications for the design of socially intrusive technologies
In this paper we describe the results of a study investigating the behaviour and views of bystanders in response to a proximal mobile telephone conversation by a third party. Anal...
Steve Love, Mark Perry