Sciweavers

589 search results - page 59 / 118
» Evaluating mobile phones as risk information providers
Sort
View
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
14 years 2 months ago
Theory and Evaluation of Human Robot Interactions
Human-robot interaction (HRI) for mobile robots is still in its infancy. Most user interactions with robots have been limited to teleoperation capabilities where the most common i...
Jean Scholtz
EKAW
2010
Springer
13 years 7 months ago
Mobile Cultural Heritage Guide: Location-Aware Semantic Search
In this paper we explore the use of location aware mobile devices for searching and browsing a large number of general and cultural heritage information repositories. Based on GPS ...
Chris J. van Aart, Bob J. Wielinga, Willem Robert ...
WWW
2006
ACM
14 years 9 months ago
Image classification for mobile web browsing
It is difficult for users of mobile devices such as cellular phones equipped with a small screen and a poor input interface to browse Web pages designed for desktop PCs with large...
Takuya Maekawa, Takahiro Hara, Shojiro Nishio
RE
2010
Springer
13 years 3 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
ESORICS
2010
Springer
13 years 10 months ago
Kamouflage: Loss-Resistant Password Management
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager i...
Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan ...