Sciweavers

55 search results - page 5 / 11
» Secure Application Updates on Point of Sale Devices
Sort
View
WPES
2004
ACM
14 years 23 days ago
Privacy preserving route planning
The number of location-aware mobile devices has been rising for several years. As this trend continues, these devices may be able to use their location information to provide inte...
Keith B. Frikken, Mikhail J. Atallah
CCS
2008
ACM
13 years 9 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
INTERACT
2003
13 years 8 months ago
Proximal Interactions: A Direct Manipulation Technique for Wireless Networking
As a number of networked digital devices are ubiquitously used, control of inter-device communications becomes a complicated task. People can no longer keep track of all the device...
Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, Haru...
IUI
2004
ACM
14 years 24 days ago
Flexible interface migration
The goal of this work is to provide users immersed in a multi-platform environment with the possibility of interacting with an application while freely moving from one device to a...
Renata Bandelloni, Fabio Paternò
DEBU
2010
238views more  DEBU 2010»
13 years 7 months ago
Spatio-Temporal Access Methods: Part 2 (2003 - 2010)
In spatio-temporal applications, moving objects detect their locations via location-aware devices and update their locations continuously to the server. With the ubiquity and mass...
Long-Van Nguyen-Dinh, Walid G. Aref, Mohamed F. Mo...