Results 301 to 310 of about 5,413,035 (337)
Some of the next articles are maybe not open access.

Multimedia for Mobile Devices

2008
Mobile communications is a continually growing sector in industry and a wide variety of visual services such as video-on-demand have been created which are limited by low-bandwidth network infrastructures. The distinction between mobile phones and personal device assistants (PDA’s) has already become blurred with pervasive computing being the term ...
openaire   +1 more source

Understanding interaction with mobile devices

Interacting with Computers, 2003
This editorial paper introduces an emerging and important area for human-computer interaction research, which concerns interaction with mobile devices. The design of interactive mobile applications should differ from that of traditional desktop applications.
openaire   +3 more sources

Mobile Devices

International Journal of Advanced Pervasive and Ubiquitous Computing, 2010
The chapter is concerned with the mobile technology and its interventions on the perception of the body and the space, demanding new behavioural codes and evoking other communication patterns. This technology enables users to be always connected, creating other practices of sociability and composing the urban landscape and the body space with digital ...
openaire   +2 more sources

Speech Recognition on Mobile Devices

2010
The enthusiasm of deploying automatic speech recognition (ASR) onmobile devices is driven both by remarkable advances in ASR technology andby the demand for efficient user interfaces on such devices as mobile phonesand personal digital assistants (PDAs).
Tan, Zheng-Hua, Lindberg, Børge
openaire   +2 more sources

The shift to mobile devices

2018
As the information environment becomes increasingly electronic, digital libraries have proliferated, but the focus has often been on innovations in technology and not the user. Although user needs have become a popular concept, in practice the users are rarely consulted in the development of services. Research and analysis of users is essential to fine-
openaire   +2 more sources

Mobile device security considerations for small- and medium-sized enterprise business mobility

Information Management & Computer Security, 2014
Purpose – This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy.
M. A. Harris, K. Patten
semanticscholar   +1 more source

Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users

Behavior and Information Technology, 2014
Smart mobile devices are a potential attack vector for cyber criminal activities. Two hundred and fifty smart mobile device owners from the University of South Australia were surveyed.
James Imgraben   +2 more
semanticscholar   +1 more source

Disappearing mobile devices

Proceedings of the 22nd annual ACM symposium on User interface software and technology, 2009
In this paper, we extrapolate the evolution of mobile devices in one specific direction, namely miniaturization. While we maintain the concept of a device that people are aware of and interact with intentionally, we envision that this concept can become small enough to allow invisible integration into arbitrary surfaces or human skin, and thus truly ...
Tao Ni, Patrick Baudisch
openaire   +2 more sources

Mobile device security

Proceedings of the 1st annual conference on Information security curriculum development, 2004
Because of their small size, memory capability, and the case with which information can be downloaded and removed from a facility, mobile devices pose a risk to organizations when used and transported outside physical boundaries. Mobile devices, including Personal Digital Assistants (PDAs), mobile phones, laptops, and smart phones can expose ...
openaire   +2 more sources

Mobile Device Security

2017
In this chapter, we review several mobile devices available on the market that allow users to support different applications’ requirements and needs. Next, we discuss popular operating systems for current consumer-type mobile devices. This chapter also highlights some important differences between mobile device security and Personal Computer (PC ...
Jesús Téllez, Sherali Zeadally
openaire   +2 more sources

Home - About - Disclaimer - Privacy