Sciweavers

304 search results - page 33 / 61
» Trusted Computing in Mobile Action
Sort
View
CHI
2003
ACM
14 years 8 months ago
Where on-line meets on the streets: experiences with mobile mixed reality games
We describe two games in which online participants collaborated with mobile participants on the city streets. In the first, the players were online and professional performers wer...
Martin Flintham, Steve Benford, Rob Anastasi, Terr...
CONCUR
1991
Springer
13 years 11 months ago
Real Space Process Algebra
We propose a process algebra obtained by adapting the process algebra with continuous relative timing from Baeten and Middelburg [Process Algebra with Timing, Springer, 2002, Chap....
Jos C. M. Baeten, Jan A. Bergstra
ICMI
2005
Springer
107views Biometrics» more  ICMI 2005»
14 years 1 months ago
Exploring multimodality in the laboratory and the field
There are new challenges to us, as researchers, on how to design and evaluate new mobile applications because they give users access to powerful computing devices through small in...
Lynne Baillie, Raimund Schatz
WIMOB
2007
IEEE
14 years 1 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
ICDCS
2011
IEEE
12 years 7 months ago
SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones
Abstract—Nowadays companies increasingly aggregate location data from different sources on the Internet to offer locationbased services such as estimating current road traffic c...
Daniele Quercia, Ilias Leontiadis, Liam McNamara, ...