Sciweavers

817 search results - page 29 / 164
» Using Ontology for Personalized Mobile Message Computation
Sort
View
COSIT
2005
Springer
95views GIS» more  COSIT 2005»
14 years 2 months ago
Simulation of Obfuscation and Negotiation for Location Privacy
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...
Matt Duckham, Lars Kulik
CORR
2008
Springer
152views Education» more  CORR 2008»
13 years 8 months ago
It's Not What You Have, But How You Use It: Compromises in Mobile Device Use
As users begin to use many more devices for personal information management (PIM) than just the traditional desktop computer, it is essential for HCI researchers to understand how...
Manas Tungare, Manuel A. Pérez-Quiño...
MOBICOM
2005
ACM
14 years 2 months ago
Using mobile relays to prolong the lifetime of wireless sensor networks
In this paper we investigate the benefits of a heterogeneous architecture for wireless sensor networks composed of a few resource rich mobile nodes and a large number of simple s...
Wei Wang 0002, Vikram Srinivasan, Kee Chaing Chua
DSVIS
2003
Springer
14 years 1 months ago
Improving User Interface Usability Using Mobile Agents
Adapting graphical user interface (GUI) to meet higher level of usability for users is one of the most interesting questions of today’s mobile computation. Users should have GUI ...
Nikola Mitrovic, Eduardo Mena
COMPSEC
2008
138views more  COMPSEC 2008»
13 years 8 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff