With the explosion of the mobile communication market, more and more handheld devices act as clients in the Internet. People use these devices to purchase books, play games, recei...
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Mobile phones, with their increasing processing power and memory, are enabling a diversity of tasks. The traditional text entry method using keypad is falling short in numerous way...
Santosh Basapur, Shuang Xu, Mark Ahlenius, Young S...
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desire...
We analyze the results of a survey distributed to heavy users of social networking website on current mobile communications practices regarding location disclosure. We discovered ...