In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
There have been many location sharing systems developed over the past two decades, and only recently have they started to be adopted by consumers. In this paper, we present the re...
Janne Lindqvist, Justin Cranshaw, Jason Wiese, Jas...
Most windowing systems follow the independent overlapping windows approach, which emerged as an answer to the needs of the 1980s’ technology. Due to advances in computers and di...
Camera phones have been viewed simplistically as digital cameras with poor picture quality while neglecting the utility of the two key functionalities of mobile phones: network co...
Abstract. Our goal in this paper is to clearly delineate how households currently manage communication and coordination information; this will provide practitioners and designers w...