Sciweavers

1751 search results - page 244 / 351
» Search on mobile phones
Sort
View
ISCA
2009
IEEE
161views Hardware» more  ISCA 2009»
15 years 4 months ago
AnySP: anytime anywhere anyway signal processing
In the past decade, the proliferation of mobile devices has increased at a spectacular rate. There are now more than 3.3 billion active cell phones in the world—a device that we...
Mark Woh, Sangwon Seo, Scott A. Mahlke, Trevor N. ...
OTM
2005
Springer
15 years 3 months ago
Selection Using Non-symmetric Context Areas
Abstract. This paper targets with applications running on mobile devices and using context informations. Following previous studies from other authors, we extend the notion of cont...
Diane Lingrand, Stephane Lavirotte, Jean-Yves Tigl...
DIM
2005
ACM
14 years 11 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
MM
2010
ACM
185views Multimedia» more  MM 2010»
14 years 10 months ago
The virtual chocolate factory: mixed reality industrial collaboration and control
We show several aspects of a complex mixed reality system that we have built and deployed in a real-world factory setting. In our system, virtual worlds, augmented realities, and ...
Maribeth Back, Don Kimber, Eleanor G. Rieffel, Ant...
IJNSEC
2006
156views more  IJNSEC 2006»
14 years 9 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed