Sciweavers

5446 search results - page 423 / 1090
» Mobile computing
Sort
View
PERCOM
2010
ACM
15 years 2 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
WOA
2010
15 years 2 months ago
Classification of Whereabouts Patterns From Large-scale Mobility Data
Classification of users' whereabouts patterns is important for many emerging ubiquitous computing applications. Latent Dirichlet Allocation (LDA) is a powerful mechanism to e...
Laura Ferrari, Marco Mamei
HCI
2009
15 years 2 months ago
Mobile-Banking Adoption and Usage by Low-Literate, Low-Income Users in the Developing World
Due to the increasing penetration of mobile phones even in poor communities, mobile-phone-enabled banking (m-banking) services are being increasingly targeted at the "unbanked...
Indrani Medhi, Aishwarya Ratan, Kentaro Toyama
ASSETS
2006
ACM
15 years 8 months ago
Where's my stuff?: design and evaluation of a mobile system for locating lost items for the visually impaired
Finding lost items is a common problem for the visually impaired and is something that computing technology can help alleviate. In this paper, we present the design and evaluation...
Julie A. Kientz, Shwetak N. Patel, Arwa Z. Tyebkha...
SACMAT
2010
ACM
15 years 3 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino