Sciweavers

589 search results - page 46 / 118
» Evaluating mobile phones as risk information providers
Sort
View
MOBISYS
2007
ACM
14 years 8 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
MHCI
2004
Springer
14 years 2 months ago
Interactive Positioning Based on Object Visibility
Abstract. In this paper we describe a new method and user interface for interactive positioning of a mobile device. The key element of this method is a questionanswer style dialogu...
Christian Kray, Gerd Kortuem
CAISE
2004
Springer
14 years 2 months ago
Process Mining for Ubiquitous Mobile Systems: An Overview and a Concrete Algorithm
Abstract. Ubiquitous Mobile Systems (UMSs) allow for automated capturing of events. Both mobility and ubiquity are supported by electronic means such as mobile phones and PDAs and ...
Ana Karla A. de Medeiros, Boudewijn F. van Dongen,...
AVI
2006
13 years 10 months ago
History Unwired: mobile narrative in historic cities
History Unwired (HU, see http://web.mit.edu/frontiers) is a multi-year investigation of the narrative uses of mobile technology in historic cities. In 2004-2005 a team of research...
Michael Epstein, Silvia Vergani
IEEEARES
2006
IEEE
14 years 2 months ago
Defense trees for economic evaluation of security investments
In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
Stefano Bistarelli, Fabio Fioravanti, Pamela Peret...