Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
— Due to the technological evolution, context-aware computing is slowly moving from dream to reality. These applications heavily rely in sensing the user’s environment and ing ...
The informal information can be so intuitive, emotional, personal, honest and subjective that it is very difficult to get them from the formal media. In this paper, we demonstrate...
Two studies on how to support communication between grandparents and grandchildren are presented. The first study, an interview with 12 parents, investigates the conversation betw...
Bente Evjemo, Gunnvald B. Svendsen, Eivind Rinde, ...
Mobile commerce (m-Commerce), which allows for anytime/anywhere access to information and services, shows great potential. Ubiquitous access to information systems is critical to e...