Found: 16
Select item for more details and to access through your institution.
Guest editorial: Theme issue on smartphone applications and services for pervasive computing.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 611, doi. 10.1007/s00779-011-0429-6
- By:
- Publication type:
- Article
my2cents: enabling research on consumer-product interaction.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 613, doi. 10.1007/s00779-011-0426-9
- By:
- Publication type:
- Article
Sketching up the world: in situ authoring for mobile Augmented Reality.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 623, doi. 10.1007/s00779-011-0430-0
- By:
- Publication type:
- Article
An Android runtime security policy enforcement framework.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 631, doi. 10.1007/s00779-011-0437-6
- By:
- Publication type:
- Article
Resuscitating privacy-preserving mobile payment with customer in complete control.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 643, doi. 10.1007/s00779-011-0436-7
- By:
- Publication type:
- Article
PowerPedia: changing energy usage with the help of a community-based smartphone application.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 655, doi. 10.1007/s00779-011-0432-y
- By:
- Publication type:
- Article
Mobile exploration of geotagged photographs.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 665, doi. 10.1007/s00779-011-0433-x
- By:
- Publication type:
- Article
Secure and efficient public key management in next generation mobile networks.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 677, doi. 10.1007/s00779-011-0434-9
- By:
- Publication type:
- Article
A smartphone watch for mobile surveillance service.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 687, doi. 10.1007/s00779-011-0435-8
- By:
- Publication type:
- Article
Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 697, doi. 10.1007/s00779-011-0427-8
- By:
- Publication type:
- Article
A recovery method of deleted record for SQLite database.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 707, doi. 10.1007/s00779-011-0428-7
- By:
- Publication type:
- Article
A cross-country comparison of the adoption of ubiquitous supply chain management.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 717, doi. 10.1007/s00779-011-0438-5
- By:
- Publication type:
- Article
Exploiting visual quasi-periodicity for real-time chewing event detection using active appearance models and support vector machines.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 729, doi. 10.1007/s00779-011-0425-x
- By:
- Publication type:
- Article
An approach to domain-based scalable context management architecture in pervasive environments.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 741, doi. 10.1007/s00779-011-0422-0
- By:
- Publication type:
- Article
You never call: Demoting unused contacts on mobile phones using DMTR.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 757, doi. 10.1007/s00779-011-0411-3
- By:
- Publication type:
- Article
Blowtooth: a provocative pervasive game for smuggling virtual drugs through real airport security.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 767, doi. 10.1007/s00779-011-0423-z
- By:
- Publication type:
- Article