Sciweavers

166 search results - page 10 / 34
» pervasive 2009
Sort
View
ACMACE
2009
ACM
14 years 4 months ago
An in-game reporting tool for pervasive games
Pervasive and location-based games are played in the real world rather than on the screen of a computer or mobile device. This makes them difficult to study. Since players move ar...
Annika Waern, Zeynep Ahmet, Daniel Sundström
HUC
2009
Springer
14 years 3 months ago
Applying pervasive technologies to create economic incentives that alter consumer behavior
Economic incentives are a powerful way of shaping consumer behavior towards more commercially efficient and environmentally sustainable patterns. In this paper, we explore the id...
Tetsuo Yamabe, Vili Lehdonvirta, Hitoshi Ito, Hayu...
CHI
2009
ACM
14 years 11 months ago
Asynchronous gameplay in pervasive multiplayer mobile games
Hannamari Saarenp?? University of Tampere Kanslerinrinne 1 33014 Tampereen Yliopisto, Finland hannamari.saarenpaa@uta.fi Hannu Korhonen Nokia Research P.O. Box 1000 00045 Nokia Gro...
Hannamari Saarenpää, Hannu Korhonen, Jan...
ACNS
2009
Springer
143views Cryptology» more  ACNS 2009»
14 years 5 months ago
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
Abstract. We examine the problem of message recognition by reviewing the definitions and the security model in the literature. In particular, we examine the Jane Doe protocol, whi...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
ICPPW
2009
IEEE
14 years 5 months ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta