Sciweavers

692 search results - page 71 / 139
» User Expectations from Dictation on Mobile Devices
Sort
View
OZCHI
2009
ACM
15 years 6 months ago
My phone is my keypad: privacy-enhanced PIN-entry on public terminals
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...
WMCSA
1999
IEEE
15 years 4 months ago
DataX: an Approach to Ubiquitous Database Access
This paper describes an approach for enabling remote database access from heterogeneous thin clients. DataX is a proxy-based architecture that supports disconnected operation by r...
Hui Lei, Marion Blount, Carl D. Tait
ADHOC
2007
134views more  ADHOC 2007»
14 years 11 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
IJMHCI
2011
249views more  IJMHCI 2011»
14 years 6 months ago
3D Talking-Head Interface to Voice-Interactive Services on Mobile Phones
We present a novel framework for easy creation of interactive, platform-independent voice-services with an animated 3D talking-head interface, on mobile phones. The framework supp...
Jirí Danihelka, Roman Hak, Lukas Kencl, Jir...
ICDE
2005
IEEE
126views Database» more  ICDE 2005»
16 years 1 months ago
A Probabilistic XML Approach to Data Integration
In mobile and ambient environments, devices need to become autonomous, managing and resolving problems without interference from a user. The database of a (mobile) device can be s...
Maurice van Keulen, Ander de Keijzer, Wouter Alink