Sciweavers

1226 search results - page 100 / 246
» Secure Mobile Gambling
Sort
View
134
Voted
CHI
2007
ACM
16 years 4 months ago
The impact of digital iconic realism on anonymous interactants' mobile phone communication
In this paper, I describe progress in research designed to explore the effect of the combination of behavioral and visual fidelity of avatars on users' social presence in syn...
Sin-Hwa Kang
134
Voted
AINA
2006
IEEE
15 years 9 months ago
A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile Environment
For effective management it is necessary to have methods by which management applications can periodically retrieve large volumes of information from network devices. In this work...
Glenn Mansfield Keeni, Kazuhide Koide, Takeo Saito...
128
Voted
IASTEDSE
2004
15 years 5 months ago
Mobile, on demand access of service-annotated 3D maps
The ever-increasing capabilities (processing power, memory, connectivity, display, etc.) of personal devices such as PDAs and mobile phones, as well as their convergence, have ena...
Michael Przybilski, Stefano Campadello, Titos Sari...
120
Voted
TWC
2008
143views more  TWC 2008»
15 years 3 months ago
Mobile Privacy in Wireless Networks-Revisited
Abstract-- With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protectin...
Caimu Tang, Dapeng Oliver Wu
114
Voted
IADIS
2003
15 years 5 months ago
Com Technology for Remote Database Connectivity with Wireless PDAS
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
David Olivieri, Juan Fco. Gálvez Gál...