Personal and ubiquitous computing : PUC
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
Inhaltsverzeichnis
- 611
-
Guest editorial: Theme issue on smartphone applications and services for pervasive computingPark, James J. (Jong Hyuk) / Chao, Han-Chieh / Shon, Taeshik et al. | 2011
- 613
-
my2cents: enabling research on consumer-product interactionKarpischek, Stephan / Michahelles, Florian / Fleisch, Elgar et al. | 2011
- 623
-
Sketching up the world: in situ authoring for mobile Augmented RealityLanglotz, Tobias / Mooslechner, Stefan / Zollmann, Stefanie et al. | 2011
- 631
-
An Android runtime security policy enforcement frameworkBanuri, Hammad / Alam, Masoom / Khan, Shahryar et al. | 2011
- 643
-
Resuscitating privacy-preserving mobile payment with customer in complete controlKonidala, Divyan Munirathnam / Dwijaksara, Made Harta / Kim, Kwangjo et al. | 2011
- 655
-
PowerPedia: changing energy usage with the help of a community-based smartphone applicationWeiss, Markus / Staake, Thorsten / Mattern, Friedemann et al. | 2011
- 665
-
Mobile exploration of geotagged photographsRost, Mattias / Cramer, Henriette / Holmquist, Lars Erik et al. | 2011
- 677
-
Secure and efficient public key management in next generation mobile networksHan, Kyusuk / Mun, Hyeran / Shon, Taeshik et al. | 2011
- 687
-
A smartphone watch for mobile surveillance serviceChung, Won-Ho et al. | 2011
- 697
-
Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16jLee, Yong / Lee, Goo Yeon / Kim, Hwa Jong et al. | 2011
- 707
-
A recovery method of deleted record for SQLite databaseJeon, Sangjun / Bang, Jewan / Byun, Keunduck et al. | 2011
- 717
-
A cross-country comparison of the adoption of ubiquitous supply chain managementKim, Changsu / Johnson, Roger / Roussos, George et al. | 2011
- 729
-
Exploiting visual quasi-periodicity for real-time chewing event detection using active appearance models and support vector machinesCadavid, Steven / Abdel-Mottaleb, Mohamed / Helal, Abdelsalam et al. | 2011
- 741
-
An approach to domain-based scalable context management architecture in pervasive environmentsJaroucheh, Zakwan / Liu, Xiaodong / Smith, Sally et al. | 2011
- 757
-
You never call: Demoting unused contacts on mobile phones using DMTRBergman, Ofer / Komninos, Andreas / Liarokapis, Dimitrios et al. | 2011
- 767
-
Blowtooth: a provocative pervasive game for smuggling virtual drugs through real airport securityKirman, Ben / Linehan, Conor / Lawson, Shaun et al. | 2011