Sciweavers

6781 search results - page 1167 / 1357
» Processors for Mobile Applications
Sort
View
AINA
2011
IEEE
13 years 1 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
CHI
2011
ACM
13 years 1 months ago
MoBoogie: creative expression through whole body musical interaction
In this paper we describe MoBoogie, an application that allows users to manipulate and arrange music through movement. MoBoogie is designed to foster experiences in creative expre...
Megan K. Halpern, Jakob Tholander, Max Evjen, Stua...
ESSOS
2011
Springer
13 years 1 months ago
SessionShield: Lightweight Protection against Session Hijacking
The class of Cross-site Scripting (XSS) vulnerabilities is the most prevalent security problem in the field of Web applications. One of the main attack vectors used in connection ...
Nick Nikiforakis, Wannes Meert, Yves Younan, Marti...
PERVASIVE
2011
Springer
13 years 14 days ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...
CADE
2011
Springer
12 years 9 months ago
Static Analysis of Android Programs
Android is a programming language based on Java and an operating system for embedded or mobile devices whose upper layers are written in that language. It features an extended even...
Étienne Payet, Fausto Spoto
« Prev « First page 1167 / 1357 Last » Next »