Sciweavers

5446 search results - page 158 / 1090
» Mobile computing
Sort
View
MOBISYS
2008
ACM
14 years 10 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
CLUSTER
2011
IEEE
12 years 10 months ago
A mobility-based cluster formation algorithm for wireless mobile ad-hoc networks
  In the last decade, numerous efforts have been devoted to design efficient algorithms for clustering the  wireless mobile ad‐hoc networks (MANET) consider...
Javad Akbari Torkestani, Mohammad Reza Meybodi
MHCI
2009
Springer
14 years 4 months ago
SeCuUI: autocomplete your terminal input
With SeCuUI we present a solution that aims to increase security of data entry on public terminals. The user can enter all data requested by the terminal using her mobile device. ...
Max-Emanuel Maurer, Alexander De Luca
CCGRID
2007
IEEE
14 years 4 months ago
DICHOTOMY: A Resource Discovery and Scheduling Protocol for Multihop Ad hoc Mobile Grids
There has been a good amount of research over the past few years on the integration of mobile devices into computational grids. Little of it, however, has addressed the more chall...
Antônio Tadeu A. Gomes, Artur Ziviani, Lucia...
JUCS
2008
248views more  JUCS 2008»
13 years 10 months ago
Cultural Factors in a Mobile Phone Adoption and Usage Model
: In human-computer interaction and computing, mobile phone usage is mostly addressed from a feature-driven perspective, i.e. which features do a certain user group use, and/or a u...
Judy van Biljon, Paula Kotzé