Sciweavers

3016 search results - page 202 / 604
» Disappearing mobile devices
Sort
View
AINA
2006
IEEE
14 years 4 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
GI
2004
Springer
14 years 4 months ago
Policy-Based Context-Management for Mobile Solutions
: Nowadays our world becomes more and more connected, and sensors and any kind of mobile (e.g. cell phones, PDAs) and fixed computational devices are linked together through wired...
Caroline Funk, Björn Schiemann
BCSHCI
2008
14 years 3 days ago
Seam carving for enhancing image usability on mobiles
In this paper we discuss a visual interface for presenting large images on small screen devices. We use the seam carving algorithm as an example technique to improve the readabili...
Nicholas Hill, Parisa Eslambolchilar
AVI
2004
14 years 1 days ago
Stitching: pen gestures that span multiple displays
Stitching is a new interaction technique that allows users to combine pen-operated mobile devices with wireless networking by using pen gestures that span multiple displays. To st...
Ken Hinckley, Gonzalo Ramos, François Guimb...
IPPS
2005
IEEE
14 years 4 months ago
Energy-Aware Task Scheduling: Towards Enabling Mobile Computing over MANETs
Enabling high performance, persistent mobile computing has recently become a very active research area. The widespread popularity of mobile computing devices, such as laptops, han...
Waleed Alsalih, Selim G. Akl, Hossam S. Hassanein