When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
The capabilities of current mobile computing devices such as PDAs and mobile phones are making it possible to design and develop mobile GIS applications that provide users with ge...
We present the iterative design of Momento, a tool that provides integrated support for situated evaluation of ubiquitous computing applications. We derived requirements for Momen...
Existing development tools provide little out-of-the-box assistance in order to design and develop accessible ICT Java solutions for impaired users. Two new approximation simulatio...
The service-oriented architectural style is widely perceived today. However, service orientation is a very general concept and its application in real-life situations is somewhat ...