Sciweavers

1608 search results - page 209 / 322
» Visualizing Information on Mobile Devices
Sort
View
MOBILITY
2009
ACM
14 years 28 days ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
ACMACE
2011
ACM
12 years 8 months ago
WeQuest: scalable alternate reality games through end-user content authoring
Alternate Reality Games (ARGs) are interactive narrative experiences that engage the player by layering a fictional world over the real world. Mobile ARG stories are often geo-sp...
Andrew Macvean, Sanjeet Hajarnis, Brandon Headrick...
WISEC
2010
ACM
13 years 8 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
CHI
2004
ACM
14 years 8 months ago
Using mental load for managing interruptions in physiologically attentive user interfaces
Today's user is surrounded by mobile appliances that continuously disrupt his activities through instant message, email and phone call notifications. In this paper, we presen...
Daniel Chen, Roel Vertegaal
SIES
2009
IEEE
14 years 3 months ago
A wireless body sensor network for the prevention and management of asthma
—We present an application of an open source platform for wireless body sensor network called DexterNet to the problem of children’s asthma. The architecture of the system cons...
Edmund Y. W. Seto, Annarita Giani, Victor Shia, Cu...