Sciweavers

313 search results - page 14 / 63
» From mobile phones to responsible devices
Sort
View
IJDE
2007
105views more  IJDE 2007»
13 years 9 months ago
Mobile Phone Forensics Tool Testing: A Database Driven Approach
The Daubert process used in the admissibility of evidence contains major guidelines applied in assessing forensic procedures, two of which are testing and error rates. The Digital...
Ibrahim M. Baggili, Richard Mislan, Marcus Rogers
MONET
2002
162views more  MONET 2002»
13 years 9 months ago
Multi-Sensor Context-Awareness in Mobile Devices and Smart Artifacts
The use of context in mobile devices is receiving increasing attention in mobile and ubiquitous computing research. In this article we consider how to augment mobile devices with a...
Hans-Werner Gellersen, Albrecht Schmidt, Michael B...
OZCHI
2009
ACM
14 years 4 months ago
My phone is my keypad: privacy-enhanced PIN-entry on public terminals
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...
COMSWARE
2006
IEEE
14 years 3 months ago
Remote storage for mobile devices
— The ability to access remote file storage from mobile devices enables a number of new use cases for storing and sharing data. We describe the design and implementation of a Rem...
Jarkko Tolvanen, Tapio Suihko, Jaakko Lipasti, N. ...
CHI
2008
ACM
14 years 10 months ago
Quickdraw: the impact of mobility and on-body placement on device access time
We investigate the effect of placement and user mobility on the time required to access an on-body interface. In our study, a wrist-mounted system was significantly faster to acce...
Daniel Ashbrook, James Clawson, Kent Lyons, Thad S...