Sciweavers

3016 search results - page 46 / 604
» Disappearing mobile devices
Sort
View
UIST
2000
ACM
14 years 2 days ago
Sensing techniques for mobile interaction
We describe sensing techniques motivated by unique aspects of human-computer interaction with handheld devices in mobile settings. Special features of mobile interaction include c...
Ken Hinckley, Jeffrey S. Pierce, Mike Sinclair, Er...
CSIE
2009
IEEE
14 years 2 months ago
A Location-Based Mechanism for Mobile Device Security
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device’s...
Wayne A. Jansen, Vlad Korolev
HICSS
2010
IEEE
276views Biometrics» more  HICSS 2010»
14 years 2 months ago
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices
This paper provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15....
Benjamin R. Moyers, John Paul Dunning, Randolph Ma...
AIED
2009
Springer
14 years 2 months ago
Who Helps When the Tutor Is Asleep?
While many computer tutoring systems have long been delivered as desktop applications, these systems have only recently begun to appear on mobile devices. In this work we apply pri...
Quincy Brown, Dario D. Salvucci, Frank J. Lee, Vin...
CHI
2009
ACM
14 years 8 months ago
Visualization and interaction techniques for mobile devices
This paper presents ongoing work toward the development of one-handed interaction techniques for mobile devices with a small touch-screen. This work comprises three main parts: th...
Anne Roudaut