Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
The standardization of the IMS as a multi-access network implies that it can be accessed by different classes of terminals. Even at the heart of the same class of terminals (mobile...
Wireless sensor nodes are used to monitor patient vital signs in a medical application. To ensure proper patient care is provided, real-time patient data must be managed correctly...
John Herbert, John O'Donoghue, Gao Ling, Kai Fei, ...
Providing haptic cues can generate increased levels of presence in users as they interact with tangible objects. In this paper, we present button effects delivered by air-jet displ...
Yeongmi Kim, Sehun Kim, Taejin Ha, Ian Oakley, Woo...