Sciweavers

996 search results - page 64 / 200
» How people use the web on mobile devices
Sort
View
MOBICOM
1996
ACM
14 years 1 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
JLBS
2008
82views more  JLBS 2008»
13 years 9 months ago
Leveraging explicitly disclosed location information to understand tourist dynamics: a case study
In recent years, the large deployment of mobile devices has led to a massive increase in the volume of records of where people have been and when they were there. The analysis of t...
Fabien Girardin, Filippo Dal Fiore, Carlo Ratti, J...
AVI
2010
13 years 7 months ago
Seeing the self in the washing machine: the deep affordance of 2.0 philosophy in the household appliance domain
The acceleration of rhythm of everyday life requires efficiency and flexibility in daily routines. The real expectations and needs of people concerning intelligent home devices sh...
Caterina Calefato, Enrico Frumento, Monica Milani,...
ISMAR
2005
IEEE
14 years 2 months ago
Face to Face Collaborative AR on Mobile Phones
Mobile phones are an ideal platform for augmented reality. In this paper we describe how they can also be used to support face to face collaborative AR gaming. We have created a c...
Anders Henrysson, Mark Billinghurst, Mark Ollila
MOBILITY
2009
ACM
14 years 1 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...