Sciweavers

152 search results - page 1 / 31
» Evaluation of Overcluttering Prevention Techniques for Mobil...
Sort
View
IV
2009
IEEE
117views Visualization» more  IV 2009»
13 years 11 months ago
Evaluation of Overcluttering Prevention Techniques for Mobile Devices
The increasing popularity of mobile devices has fostered the development of visualization applications for these devices. However, the reduced screen size and different interactio...
Paulo Miguel Pombinho de Matos, Maria Beatriz Carm...
RAID
2009
Springer
13 years 10 months ago
VirusMeter: Preventing Your Cellphone from Spies
Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growi...
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen
EATIS
2007
ACM
13 years 8 months ago
Techniques for location selection on a mobile device
In the current paper we present a field comparison of techniques for selecting one's current location in mobile locationbased systems. Four location selection techniques are ...
Mika Luimula, Kirsti Sääskilahti, Timo P...
IACR
2011
137views more  IACR 2011»
12 years 3 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
DIMVA
2006
13 years 5 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...