In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
: We consider socio-technical processes, i.e. processes where machines as well as humans participate. Typical examples occur in sales processes in e-commerce. Three modeling tasks ...
Computer-mediated communication systems can be used to bridge the gap between doctors in underserved regions with local shortages of medical expertise and medical specialists worl...
Context-aware computing describes the situation where a wearable / mobile computer is aware of its user’s state and surroundings and modifies its behavior based on this informat...
Andreas Krause, Daniel P. Siewiorek, Asim Smailagi...
The rapid development of handheld devices is driving the development of new interaction styles. This paper examines one such technique: using hand motions to control a menu system...