Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
Pervasive and location-based games are played in the real world rather than on the screen of a computer or mobile device. This makes them difficult to study. Since players move ar...
Recently, the low price and the small size of the mobile device makes a great success in personal mobile communication. A lot of people use a cell phone, PDA, and laptop computer ...
Scientific practices increasingly incorporate sensors for data capture, information visualization for data analysis, and low-cost mobile devices for fieldbased inquiries incorpora...
Daniel Spikol, Marcelo Milrad, Heidy Maldonado, Ro...