Some popular computing technologies, such as ubiquitous computing, grid computing and thin-client computing, bring people to a much more distributed and pervasive computing enviro...
Context awareness is an important functionality for wearable computers. In particular, the computer should know where the person is in the environment. This paper proposes an imag...
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
: This paper presents ARCHEOGUIDE, a novel system offering augmented reality tours in archaeological sites. The system is based on wearable and mobile computers, networking technol...
Vassilios Vlahakis, John Karigiannis, Manolis Tsot...
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...