Sciweavers

589 search results - page 9 / 118
» Evaluating mobile phones as risk information providers
Sort
View
SIGCOMM
2010
ACM
13 years 9 months ago
NeuroPhone: brain-mobile phone interface using a wireless EEG headset
Neural signals are everywhere just like mobile phones. We propose to use neural signals to control mobile phones for hands-free, silent and effortless human-mobile interaction. Un...
Andrew T. Campbell, Tanzeem Choudhury, Shaohan Hu,...
SECON
2010
IEEE
13 years 6 months ago
iPoint: A Platform-Independent Passive Information Kiosk for Cell Phones
We introduce iPoint, a passive device that can interact and deliver information to virtually any mobile phone equipped with a WiFi network interface and a camera. The iPoint does n...
Hooman Javaheri, Guevara Noubir
IJMC
2008
70views more  IJMC 2008»
13 years 8 months ago
Applying the theory of task-technology fit to mobile technology: the role of user mobility
In this paper, we apply the theory of task technology fit to mobile technology, focusing specifi-cally on the role of user mobility. We describe the results of an empirical study ...
Judith Gebauer, Ya Tang
CSE
2009
IEEE
14 years 3 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 8 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...