Sciweavers

65 search results - page 9 / 13
» On a Journey from Message to Observable Pervasive Applicatio...
Sort
View
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 1 months ago
What Instills Trust? A Qualitative Study of Phishing
This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icon...
Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevi...
MOBISYS
2007
ACM
14 years 7 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
CORR
2010
Springer
129views Education» more  CORR 2010»
13 years 7 months ago
Understanding periodicity and regularity of nodal encounters in mobile networks: A spectral analysis
Abstract--Study on human mobility is gaining increasing attention from the research community with its multiple applications to use in mobile networks, particularly for the purpose...
Sungwook Moon, Ahmed Helmy
CHI
2006
ACM
14 years 8 months ago
Collective creation and sense-making of mobile media
Traditionally, mobile media sharing and messaging has been studied from the perspective of an individual author making media available to other users. With the aim of supporting s...
Antti Salovaara, Giulio Jacucci, Antti Oulasvirta,...
AOSD
2007
ACM
13 years 11 months ago
Declarative failure recovery for sensor networks
Wireless sensor networks consist of a system of distributed sensors embedded in the physical world, and promise to allow observation of previously unobservable phenomena. Since th...
Ramakrishna Gummadi, Nupur Kothari, Todd D. Millst...