Sciweavers

5446 search results - page 110 / 1090
» Mobile computing
Sort
View
BROADNETS
2005
IEEE
14 years 3 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
IWCMC
2006
ACM
14 years 4 months ago
Analysis of mobile beacon aided in-range localization scheme in ad hoc wireless sensor networks
In this paper, We mathematically model the In-Range localization scheme in the presence of a Mobile Beacon. In the In-Range localization scheme, a sensor with unknown location is ...
T. V. Srinath, Anil Kumar Katti, V. S. Ananthanara...
MHCI
2009
Springer
14 years 4 months ago
Measuring Mobile Emotions: Measuring the Impossible?
Emotions as such is a research topic with a lot of coverage in various domains (neuroscience, psychology, medicine, criminology and more recently in user experience research). Thi...
Arjan Geven, Manfred Tscheligi, Lucas Noldus
GLOBECOM
2009
IEEE
14 years 4 months ago
Modeling and Characterizing User Experience in a Cloud Server Based Mobile Gaming Approach
—With the evolution of mobile devices and networks, and the growing trend of mobile Internet access, rich, multi-player gaming using mobile devices, similar to PC-based Internet ...
Shaoxuan Wang, Sujit Dey
CAISE
2003
Springer
14 years 3 months ago
Towards a Component based Privacy Protector Architecture
The development of mobile communication technology and ubiquitous computing paradigm and the emergence of m-healthcare, m-business and m-education services have raised the urgency ...
Amr Ali Eldin, René W. Wagenaar