Sciweavers

589 search results - page 31 / 118
» Evaluating mobile phones as risk information providers
Sort
View
ICMCS
2009
IEEE
107views Multimedia» more  ICMCS 2009»
13 years 6 months ago
Feasibility evaluation of context distribution in mobile environment
Although mobile devices are rich sources of context information, the distribution of context in mobile environments is often hindered by the limited battery life, and wireless con...
Timo Koskela, Janne Lahti, Jani Pellikka, Sari J&a...
ASSETS
2006
ACM
14 years 14 days ago
Where's my stuff?: design and evaluation of a mobile system for locating lost items for the visually impaired
Finding lost items is a common problem for the visually impaired and is something that computing technology can help alleviate. In this paper, we present the design and evaluation...
Julie A. Kientz, Shwetak N. Patel, Arwa Z. Tyebkha...
DIMVA
2006
13 years 10 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...
AISS
2010
114views more  AISS 2010»
13 years 6 months ago
Context Awareness Information Sharing Service based on Location-based Communication Policy
Since more networking technologies and communication channels have been developed, Internet users have moved their roles from being strictly information consumers to both informat...
Yih-Jiun Lee
MM
2004
ACM
133views Multimedia» more  MM 2004»
14 years 2 months ago
From context to content: leveraging context to infer media metadata
The recent popularity of mobile camera phones allows for new opportunities to gather important metadata at the point of capture. This paper describes a method for generating metad...
Marc Davis, Simon King, Nathan Good, Risto Sarvas