Recent popularity of web-enabled mobile devices such as handheld devices and PDAs has made mobile Internet access very popular. However, considering the limitation of mobile devic...
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
In this paper, a system called GENTORO that supports children's storytelling activities is proposed. By using GENTORO, children can make a robot play their story in the real ...
This paper reviews the literature surrounding an information filtering technique, collaborative information filtering, which supports the discovery of resources in a way that is se...
Andrew Walker, Mimi Recker, Kimberly Lawless, Davi...
System-level power exploration requires tools for estimation of the overall power consumed by a system, as well as a detailed breakdown of the consumption of its main functional b...
Luca Benini, Marco Ferrero, Alberto Macii, Enrico ...