Sciweavers

589 search results - page 61 / 118
» Evaluating mobile phones as risk information providers
Sort
View
AUTONOMICS
2007
ACM
14 years 26 days ago
Adaptive learning of semantic locations and routes
Abstract. Adaptation of devices and applications based on contextual information has a great potential to enhance usability and mitigate the increasing complexity of mobile devices...
Keshu Zhang, Haifeng Li, Kari Torkkola, Mike Gardn...
MM
2003
ACM
140views Multimedia» more  MM 2003»
14 years 2 months ago
Looking into video frames on small displays
With the growing popularity of personal digital assistants and smart phones, people have become enthusiastic to watch videos through these mobile devices. However, a crucial chall...
Xin Fan, Xing Xie, He-Qin Zhou, Wei-Ying Ma
DIM
2009
ACM
14 years 1 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
MIDDLEWARE
2010
Springer
13 years 7 months ago
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications
Recent Internet applications, such as online social networks and user-generated content sharing, produce an unprecedented amount of social information, which is further augmented b...
Nicolas Kourtellis, Joshua Finnis, Paul Anderson, ...
CHI
2009
ACM
14 years 9 months ago
Associative personal information management
Personal information management (PIM) is an important and hard research problem. Previous systems suffer inflexibility because of strict hierarchies and immobility. I present an a...
Jonathan Diehl