Sciweavers

1045 search results - page 44 / 209
» Remote Evaluation of Mobile Applications
Sort
View
ICISS
2009
Springer
13 years 7 months ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara
CHI
2008
ACM
14 years 10 months ago
Sun dial: exploring techno-spiritual design through a mobile islamic call to prayer application
We present the design and formative evaluation of Sun Dial, an application that supports Muslims' prayer practices. We report on a study that involved identifying prayer as a...
Susan Wyche, Kelly E. Caine, Benjamin K. Davison, ...
MOBISEC
2009
Springer
14 years 4 months ago
Extending the Belgian eID Technology with Mobile Security Functionality
The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a lim...
Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vince...
CHI
2004
ACM
14 years 10 months ago
Dual ecologies of robot as communication media: thoughts on coordinating orientations and projectability
The aim of our study is to investigate systems for supporting remote instruction via a mobile robot. In the real world, instructions are typically given through words and body ori...
Hideaki Kuzuoka, Keiichi Yamazaki, Akiko Yamazaki,...
AAAI
2004
13 years 11 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...