In ubiquitous computing, invisible devices and software are connected to one another to provide convenient services to users [1][2]. Users hope to obtain a personalized service wh...
This paper presents a social and personal context modeling method on mobile device. It infers user’s contexts, such as amity with others and emotional state, from uncertain logs...
Abstract—A person usually carries multiple authentication tokens in the form of various cards to access services electronically. Often the service outlets are equipped with a str...
We introduce a technique for using an untrusted device, such as a hand-held personal digital assistant or a laptop to perform real nancial transactions without a network. We utili...
The small screen size of handheld mobile devices poses an inherent problem in visualizing data: very often it is too difficult and unpleasant to navigate through the plethora of p...
Dongsong Zhang, George Karabatis, Zhiyuan Chen, Bo...