Sciweavers

1462 search results - page 86 / 293
» Using ubiquitous computing in interactive mobile marketing
Sort
View
CHI
2005
ACM
16 years 1 months ago
An experiment in discovering personally meaningful places from location data
As mobile devices become location-aware, they offer the promise of powerful new applications. While computers work with physical locations like latitude and longitude, people thin...
Changqing Zhou, Pamela J. Ludford, Dan Frankowski,...
ICPADS
2005
IEEE
15 years 7 months ago
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups
In this paper we propose an efficient key agreement protocol suite for heterogeneous mobile ad-hoc groups, whose members use mobile devices with different performance limitations...
Mark Manulis
ESAS
2007
Springer
15 years 5 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
MHCI
2007
Springer
15 years 7 months ago
Target selection on mobile devices using display segmentation
In this paper, we explore the use of an interaction technique called sequential segmentation to support target selection for mobile devices. Sequential segmentation iteratively pa...
David Dearman, Kori M. Inkpen, Khai N. Truong
100
Voted
CHI
2007
ACM
16 years 1 months ago
A study of emergency response work: patterns of mobile phone interaction
This paper presents descriptive accounts of time-critical organizing in the domain of emergency response. Patterns of mobile phone interaction in such work is analyzed showing how...
Jonas Landgren, Urban Nulden