Sciweavers

11 search results - page 2 / 3
» Digital rights management in a 3G mobile phone and beyond
Sort
View
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
14 years 5 months ago
Mobile call graphs: beyond power-law and lognormal distributions
We analyze a massive social network, gathered from the records of a large mobile phone operator, with more than a million users and tens of millions of calls. We examine the distr...
Mukund Seshadri, Sridhar Machiraju, Ashwin Sridhar...
PERVASIVE
2009
Springer
14 years 6 days ago
Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker
Research has demonstrated that information workers often manage several different computing devices in an effort to balance convenience, mobility, input efficiency, and content rea...
Amy K. Karlson, Brian Meyers, Andy Jacobs, Paul Jo...
DIM
2005
ACM
13 years 7 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
ACSAC
2010
IEEE
13 years 3 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
WMASH
2004
ACM
13 years 11 months ago
Smart edge server: beyond a wireless access point
Wireless access at cafes, airports, homes and businesses have proliferated all over the globe with several different Wireless Internet Service Providers. Similarly, digital media ...
Geetha Manjunath, Tajana Simunic, Venkatesh Krishn...