The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Current smartphone technology presents many challenges for blind users. This article introduces the use of deformable inputs for blind users, which offers such users the ability to physically manipulate a device for system interaction. The authors describe the iterative design process of a deformable device prototype, Typhlex, with strategically placed grooves to elicit bend gestures. To understand...
Web browsers and e-book are some of the most dominant applications on mobile devices today; they spend a significant amount of time handling the layout design of text. Many efforts have been made in software to improve the performance of text layout and display but none have consider dedicated parallel processing hardware schemes for System-on-Chip (SoC) devices. This paper introduces a new hardware-software...
Mobile devices carry a number of vulnerabilities that, when exploited, can result in proprietary-data leakage, data alteration, fraudulent transactions and, in extreme cases, physical damage to the user and surroundings. Such attacks can be instigated by both outsiders and insiders, and can leverage vulnerabilities embedded in the hardware and software components of the device, as well as risky behavioral...
In this article, the authors discuss new trends in powering pervasive computing systems and review what we have learned in the last 15 years of building such systems. Major advances in cloud computing, RF, power harvesting, and networking have enabled new asymmetric architectures that reduce our reliance on batteries. Although the authors see a slowing of Moore's law, and although battery density...
As machines in most industries continue to grow in complexity, user interfaces play an increasingly important role in allowing operators to naturally interact with such machines. In this paper, we present a versatile approach that can enable operators to interact with a variety of machines using smart mobile devices. A low-cost, embedded system-based setup and an easy-to-implement communication method...
Mobile security is a main topic of concern for the enterprise. Corporate data stored in employees device post a potential security risk of getting lost, stolen or get accessed by unauthorized personal. There are many solutions in the market that addresses this issue. Most of these solutions revolve around applying stronger password, others make use of the encryption of either full or partial hard...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.