Sciweavers

692 search results - page 44 / 139
» User Expectations from Dictation on Mobile Devices
Sort
View
ACSW
2007
13 years 10 months ago
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of netw...
Oliver Jorns, Gerald Quirchmayr, Oliver Jung
MOBIHOC
2000
ACM
14 years 26 days ago
DEAPspace: transient ad-hoc networking of pervasive devices
The rapid spreading of mobile computerized devices marks the beginning of a new computing paradigm characterized by ad hoc networking and spontaneous interaction, taking place tra...
Reto Hermann, Dirk Husemann, Michael Moser, Michae...
ISORC
2006
IEEE
14 years 2 months ago
Automated Logging of Mobile Phones Failures Data
The increasing complexity of mobile phones directly affects their reliability, while the user tolerance for failures becomes to decrease, especially when the phone is used for bus...
Paolo Ascione, Marcello Cinque, Domenico Cotroneo
PUC
2006
89views more  PUC 2006»
13 years 8 months ago
Using ubiquitous computing in interactive mobile marketing
Unique features of handheld devices, including their mobility, personalization and location-awareness engender new types of applications for mobile commerce, such as mobile adverti...
Stan Kurkovsky, Karthik Harihar
SOUPS
2009
ACM
14 years 3 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe