Sciweavers

2580 search results - page 164 / 516
» Systems for human-powered mobile computing
Sort
View
AINA
2009
IEEE
15 years 9 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
AINA
2007
IEEE
15 years 10 months ago
The Community Stack: Concept and Prototype
Location awareness and mobility are main factors in pervasive computing. There is a lot of work focusing on develop location aware applications. Generalizing from location awarene...
Tuan Nguyen, Seng Wai Loke, Torab Torabi
SOUPS
2009
ACM
15 years 10 months ago
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social net...
Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes D...
ICALT
2006
IEEE
15 years 10 months ago
Mobile Technology and Content Delivery in Education
The purpose of this workshop is to identify various issues that are pertinent to the development and delivery of content in the context of mobile devices. The workshop will focus ...
Rory McGreal, Kinshuk
ACMACE
2004
ACM
15 years 9 months ago
Mobile sound communities
: This paper describes a research project aimed at developing authoring tools for the collaborative creation of soundscapes and an associated system for the storage and playback of...
William Carter, Scott S. Fisher