Personal and ubiquitous computing : PUC
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
Inhaltsverzeichnis
- 801
-
Automotive user interfaces and interactive applications in the carKun, Andrew L. / Schmidt, Albrecht / Dey, Anind et al. | 2012
- 803
-
On credibility improvements for automotive navigation systemsSchaub, Florian / Hipp, Markus / Kargl, Frank et al. | 2012
- 815
-
Browsing the information highway while driving: three in-vehicle touch screen scrolling methods and driver distractionKujala, Tuomo et al. | 2012
- 825
-
Interactions between human–human multi-threaded dialogues and drivingKun, Andrew L. / Shyrokov, Alexander / Heeman, Peter A. et al. | 2012
- 835
-
Advanced security technologies and applications for ubiquitous computingKim, Jongsung / Lu, Jiqiang / Hsu, Ching-Hsien et al. | 2012
- 837
-
An ID-based online/offline signature scheme without random oracles for wireless sensor networksWang, Zhiwei / Chen, Wei et al. | 2012
- 843
-
Aspect ratio invariant visual cryptography by image filtering and resizingYang, Ching-Nung / Chen, Pin-Wei / Shih, Hsiang-Wen et al. | 2012
- 851
-
An algorithm on fairness verification of mobile sink routing in wireless sensor networkXu, Guangquan / Li, Weisheng / Xu, Rui et al. | 2012
- 865
-
A collaborative routing protocol against routing disruptions in MANETsSun, Hung-Min / Chen, Chiung-Hsun / Yeh, Chih-Wen et al. | 2012
- 875
-
Reference-based importance assessment model of identity informationFu, Zombo / Cao, Yuan / Wang, Jianxin et al. | 2012
- 883
-
Protecting the sink location privacy in wireless sensor networksYao, Lin / Kang, Lin / Shang, Pengfei et al. | 2012
- 895
-
On the security and improvement of a two-factor user authentication scheme in wireless sensor networksSun, Da-Zhi / Li, Jian-Xin / Feng, Zhi-Yong et al. | 2012
- 907
-
A novel intrusion detection framework for wireless sensor networksFarooqi, Ashfaq Hussain / Khan, Farrukh Aslam / Wang, Jin et al. | 2012
- 921
-
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computingKim, Mooseop / Lee, Deok Gyu / Ryou, Jaecheol et al. | 2012
- 933
-
Go anywhere: user-verifiable authentication over distance-free channel for mobile devicesKang, Sukin / Kim, Jonguk / Hong, Manpyo et al. | 2012
- 945
-
A novel secure key paring protocol for RF4CE ubiquitous smart home systemsHan, Kyusuk / Kim, Jangseong / Shon, Taeshik et al. | 2012
- 951
-
Top-k entities query processing on uncertainly fused multi-sensory dataLiu, Dexi / Wan, Changxuan / Xiong, Naixue et al. | 2012
- 965
-
The burden of proof and the optimal security investment of firms in ubiquitous computingChun, Se-Hak et al. | 2012
- 971
-
New developments in pervasive and ambient information systemsShakshuki, Elhadi / Younas, Muhammad et al. | 2012
- 973
-
A pure peer-to-peer approach for kNN query processing in mobile ad hoc networksNghiem, Thao P. / Waluyo, Agustinus Borgy / Taniar, David et al. | 2012
- 987
-
Enhancing biometric recognition with spatio-temporal reasoning in smart environmentsMenon, Vivek / Jayaraman, Bharat / Govindaraju, Venu et al. | 2012
- 999
-
Wireless sensor networks and human comfort indexRawi, Mohd Izani Mohamed / Al-Anbuky, Adnan et al. | 2012
- 1013
-
Trust-based authentication scheme with user rating for low-resource devices in smart environmentsEl Husseini, Anas / M’Hamed, Abdallah / El Hassan, Bachar et al. | 2012
- 1025
-
Towards augmenting federated wireless sensor networks in forestry applicationsAl-Turjman, Fadi M. / Hassanein, Hossam / Oteafy, Sharief et al. | 2012
- 1035
-
A content search system considering the activity and context of a mobile userIwata, Mayu / Miyamoto, Hiroki / Hara, Takahiro et al. | 2012
- 1051
-
SN-SEC: a secure wireless sensor platform with hardware cryptographic primitivesMoh’d, Abidalrahman / Aslam, Nauman / Phillips, William et al. | 2012