Sciweavers

3016 search results - page 363 / 604
» Disappearing mobile devices
Sort
View
CHI
2007
ACM
14 years 11 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
MOBIHOC
2001
ACM
14 years 10 months ago
Effects of wireless physical layer modeling in mobile ad hoc networks
In most studies on mobile ad hoc networks (MANET), simulation models are used for the evaluation of devices and protocols. Typically, such simulations focus on the specific higher...
Mineo Takai, Jay Martin, Rajive Bagrodia
COMPSAC
2009
IEEE
14 years 5 months ago
Defending Battery Exhaustion Attacks on Mobile Systems
Battery Exhaustion Attack is a “denial of service” attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the ...
Sungyong Shin, Taek Lee, Hoh Peter In
ICC
2009
IEEE
174views Communications» more  ICC 2009»
14 years 5 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
MHCI
2009
Springer
14 years 5 months ago
Eyes-free overviews for mobile map applications
We outline two new auditory interaction techniques which build upon existing visual techniques to display off-screen points of interest (POI) in map based mobile computing applic...
David K. McGookin, Stephen A. Brewster