Abstract. In recent years, the rapid development of network infrastructure and the spread of terminals capable of network access have made it possible to access networks at any pla...
In access-control systems, policy rules conflict when they prescribe different decisions (ALLOW or DENY) for the same access. We present the results of a user study that demonstr...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
CT Cellphones have the potential to improve education for the millions of underprivileged users in the developing world. However, mobile learning in developing countries remains un...
This paper describes the combination of two technologies, augmented reality and GIS, to provide a new way to visualise viticulture GIS data using outdoor mobile computers. Viticul...
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...