Sciweavers

589 search results - page 9 / 118
» Evaluating mobile phones as risk information providers
Sort
View
SIGCOMM
2010
ACM
14 years 12 months ago
NeuroPhone: brain-mobile phone interface using a wireless EEG headset
Neural signals are everywhere just like mobile phones. We propose to use neural signals to control mobile phones for hands-free, silent and effortless human-mobile interaction. Un...
Andrew T. Campbell, Tanzeem Choudhury, Shaohan Hu,...
SECON
2010
IEEE
14 years 9 months ago
iPoint: A Platform-Independent Passive Information Kiosk for Cell Phones
We introduce iPoint, a passive device that can interact and deliver information to virtually any mobile phone equipped with a WiFi network interface and a camera. The iPoint does n...
Hooman Javaheri, Guevara Noubir
79
Voted
IJMC
2008
70views more  IJMC 2008»
14 years 11 months ago
Applying the theory of task-technology fit to mobile technology: the role of user mobility
In this paper, we apply the theory of task technology fit to mobile technology, focusing specifi-cally on the role of user mobility. We describe the results of an empirical study ...
Judith Gebauer, Ya Tang
CSE
2009
IEEE
15 years 6 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
150
Voted
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 11 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...