Sciweavers

589 search results - page 48 / 118
» Evaluating mobile phones as risk information providers
Sort
View
CHI
2011
ACM
13 years 12 days ago
GreenHat: exploring the natural environment through experts' perspectives
We present GreenHat, an interactive mobile learning application that helps students learn about biodiversity and sustainability issues in their surroundings from experts’ points...
Kimiko Ryokai, Lora Oehlberg, Michael Manoochehri,...
ADHOCNOW
2007
Springer
14 years 3 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
INFOCOM
2010
IEEE
13 years 7 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
UIST
2009
ACM
14 years 3 months ago
Virtual shelves: interactions with orientation aware devices
Triggering shortcuts or actions on a mobile device often requires a long sequence of key presses. Because the functions of buttons are highly dependent on the current applicationâ...
Frank Chun Yat Li, David Dearman, Khai N. Truong
PERVASIVE
2008
Springer
13 years 8 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...