We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
In this paper, we describe design work with 36 children aged 9 and 10 in Bristol, United Kingdom. The design work was conducted using emerging mobile and wireless technology which...
Morris Williams, Owain Jones, Constance Fleuriot, ...
Recent years have seen the growing popularity of multi-rate wireless network devices (e.g., 802.11a cards) that can exploit variations in channel conditions and improve overall ne...
Zhengrong Ji, Yi Yang, Junlan Zhou, Mineo Takai, R...
— Wireless sensor networks span from military applications into everyday life. Body sensor networks greatly benefit from wireless sensor networks to answer the biofeedback challe...
Orlando R. E. Pereira, Paulo A. C. S. Neves, Joel ...
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...