Sciweavers

3016 search results - page 59 / 604
» Disappearing mobile devices
Sort
View
SAC
2002
ACM
13 years 8 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
ICDIM
2007
IEEE
14 years 3 months ago
Fast encounter-based synchronization for mobile devices
The large and growing number of computing devices used by individuals has caused the challenges of distributed storage to take on increased importance. In addition to desktops and...
Daniel Peek, Douglas B. Terry, Venugopalan Ramasub...
CHI
2005
ACM
14 years 9 months ago
Mixed interaction space: designing for camera based interaction with mobile devices
In mobile devices, such as mobile phones and PDAs, an integrated camera can be used to interact with the device in new ways. In this paper we introduce the term mixed interaction ...
Thomas Riisgaard Hansen, Eva Eriksson, Andreas Lyk...
HICSS
2008
IEEE
115views Biometrics» more  HICSS 2008»
14 years 3 months ago
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detect...
Timothy Buennemeyer, Theresa M. Nelson, Lee M. Cla...
SAC
2005
ACM
14 years 2 months ago
A generic serializer for mobile devices
In this paper we describe a serializer component completely realized in .NET managed code, able to run on a stripped versions of the .NET platform (e.g., Compact Framework) and st...
Mattia Monga, Angelo Scotto