Sciweavers

7265 search results - page 1384 / 1453
» Mobile human-computer interaction
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 10 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
IPM
2006
77views more  IPM 2006»
13 years 10 months ago
Effective search results summary size and device screen size: Is there a relationship?
In recent years, small screen devices have seen widespread increase in their acceptance and use. Combining mobility with increased technological advances many such devices can now...
Simon O. Sweeney, Fabio Crestani
TROB
2008
152views more  TROB 2008»
13 years 10 months ago
Catadioptric Visual Servoing From 3-D Straight Lines
In this paper, we consider the problem of controlling a 6 DOF holonomic robot and a nonholonomic mobile robot from the projection of 3-D straight lines in the image plane of centra...
Hicham Hadj-Abdelkader, Youcef Mezouar, Philippe M...
JMM
2007
107views more  JMM 2007»
13 years 10 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner
RIA
2008
104views more  RIA 2008»
13 years 9 months ago
Scatterbox: Context-Aware Message Management
Applications that rely on mobile devices for user interaction must be mindful of the user's limited attention, which will typically be split between several competing tasks. C...
Stephen Knox, Ross Shannon, Lorcan Coyle, Adrian K...
« Prev « First page 1384 / 1453 Last » Next »