Sciweavers

848 search results - page 146 / 170
» Mobile Phones as Pointing Devices
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 11 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
WMCSA
2000
IEEE
14 years 3 days ago
Optimising thin clients for wireless active-media applications
The thin client model is uniquely suited for lowbandwidth mobile environments, where resource-poor devices may need to access critical applications over wireless networks. In this...
Cumbur Aksoy, Abdelsalam Helal
SACMAT
2009
ACM
14 years 2 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
PVLDB
2008
146views more  PVLDB 2008»
13 years 7 months ago
Efficient search for the top-k probable nearest neighbors in uncertain databases
Uncertainty pervades many domains in our lives. Current real-life applications, e.g., location tracking using GPS devices or cell phones, multimedia feature extraction, and sensor...
George Beskales, Mohamed A. Soliman, Ihab F. Ilyas
MHCI
2009
Springer
14 years 2 months ago
Sweep-Shake: finding digital resources in physical environments
In this article we describe the Sweep-Shake system, a novel, low interaction cost approach to supporting the spontaneous discovery of geo-located information. By sweeping a mobile...
Simon Robinson, Parisa Eslambolchilar, Matt Jones