Sciweavers

236 search results - page 15 / 48
» Analyzing Privacy Designs of Mobile Social Networking Applic...
Sort
View
HOTOS
2007
IEEE
15 years 1 months ago
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era
Today's rich and varied wireless environment, including mobile phones, Wi-Fi-enabled laptops, and Bluetooth headsets, poses threats to our privacy that cannot be addressed wi...
Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang,...
IPSN
2007
Springer
15 years 3 months ago
Building a sensor network of mobile phones
Mobile phones have two sensors: a camera and a microphone. The widespread and ubiquitous nature of mobile phones around the world makes it attractive to build a large-scale sensor...
Aman Kansal, Michel Goraczko, Feng Zhao
PERCOM
2003
ACM
15 years 9 months ago
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services
In pervasive computing environments, powerful handheld devices with wireless connections create opportunities for many new nomadic applications. We propose a new service discovery...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
ICDCS
2011
IEEE
13 years 9 months ago
E-Shadow: Lubricating Social Interaction Using Mobile Phones
—In this paper, we propose E-Shadow, a distributed mobile phone-based local social networking system. E-Shadow has two main components: (1) Local profiles. They enable EShadow u...
Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Do...
HICSS
2010
IEEE
187views Biometrics» more  HICSS 2010»
15 years 4 months ago
Engaging the Periphery for Visual Communication on Mobile Phones
While mobile phones have become ubiquitous instruments of communication and social interaction, they still require explicit interaction, placing high demands on attention. Engagin...
Lisa Cowan, William G. Griswold, Louise Barkhuus, ...