Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
Can Augmented Reality (AR) techniques inform the design and implementation of a mobile multimedia guide for the museum setting? Drawing from our experience both on previous mobile...
Areti Damala, Pierre Cubaud, Anne Bationo, Pascal ...
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
In this paper, we describe the Architecture Description Language (ADL) that we are defining for the design of agentbased systems. This aims at filing the gap between the analysis ...