Sciweavers

589 search results - page 56 / 118
» Evaluating mobile phones as risk information providers
Sort
View
CHI
2008
ACM
14 years 9 months ago
Query suggestions for mobile search: understanding usage patterns
Entering search terms on mobile phones is a time consuming and cumbersome task. In this paper, we explore the usage patterns of query entry interfaces that display suggestions. Ou...
Maryam Kamvar, Shumeet Baluja
IPPS
2007
IEEE
14 years 3 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
ACSAC
2005
IEEE
14 years 2 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
UIST
2009
ACM
14 years 3 months ago
ARC-Pad: absolute+relative cursor positioning for large displays with a mobile touchscreen
We introduce ARC-Pad (Absolute+Relative Cursor pad), a novel technique for interacting with large displays using a mobile phone’s touchscreen. In ARC-Pad we combine absolute and...
David C. McCallum, Pourang Irani
PERVASIVE
2006
Springer
13 years 8 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford