Sciweavers

304 search results - page 36 / 61
» Trusted Computing in Mobile Action
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit...
WIOPT
2005
IEEE
14 years 1 months ago
An Interactive Transparent Protocol for Connection Oriented Mobility -- Performance Analysis with Voice Traffic
Loss-Free handoff in Mobile Networks is an extensive research area. Mobile IP (MIP) provided a solution to enable a mobile node to roam from one location to another while maintain...
Raid Zaghal, Sandeep Davu, Javed I. Khan
UIC
2007
Springer
14 years 1 months ago
Surface-Embedded Passive RF Exteroception: Kepler, Greed, and Buffon's Needle
Surface-embedded passive radio frequency (PRF) exteroception is a method whereby an action to be executed by a mobile unit is selected through a signal received from a surface-embe...
Vladimir A. Kulyukin, Aliasgar Kutiyanawala, Mingh...
MOBISYS
2008
ACM
14 years 7 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
HUC
1999
Springer
13 years 12 months ago
The Role of Connectivity in Supporting Context-Sensitive Applications
This paper considers the role of network connectivity in supporting context-sensitive applications. A range of context-sensitive applications are analysed with respect to connectiv...
Keith Cheverst, Nigel Davies, Keith Mitchell, Adri...