Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2021
A Longitudinal Study of Pervasive Display Personalisation
- Mateusz Mikusz,
- Peter Shaw,
- Nigel Davies,
- Petteri Nurmi,
- Sarah Clinch,
- Ludwig Trotter,
- Ivan Elhart,
- Marc Langheinrich,
- Adrian Friday
ACM Transactions on Computer-Human Interaction (TOCHI), Volume 28, Issue 1Article No.: 2, Pages 1–45https://doi.org/10.1145/3418352Widespread sensing devices enable a world in which physical spaces become personalised in the presence of mobile users. An important example of such personalisation is the use of pervasive displays to show content that matches the requirements of ...
- research-articleJune 2020
Geopriv4j: an open source repository for practical location privacy
GeoRich '20: Proceedings of the Sixth International ACM SIGMOD Workshop on Managing and Mining Enriched Geo-Spatial DataArticle No.: 2, Pages 1–6https://doi.org/10.1145/3403896.3403968The breach of users' location privacy can be catastrophic. To prevent privacy breaches, numerous location privacy methods have been developed in the last two decades. However, they have not been widely adopted in location-based applications. As a result, ...
- Work in ProgressJune 2019
Designing Technology to Support Safety for Transgender Women & Non-Binary People of Color
DIS '19 Companion: Companion Publication of the 2019 on Designing Interactive Systems Conference 2019 CompanionPages 289–294https://doi.org/10.1145/3301019.3323898This work provides a preliminary understanding of how transgender women and non-binary people of color experience violence and manage safety, and what opportunities exist for HCI to support the safety needs of this community. We conducted nine ...
- research-articleJanuary 2018
Location-based applications, services and technologies in aid of flight planning and GPS-based navigation for visual flight rules in developing countries: with a case study
International Journal of Space-Based and Situated Computing (IJSSC), Volume 8, Issue 4Pages 225–237https://doi.org/10.1504/ijssc.2018.098695General aviation flights range from gliders and powered parachutes to corporate business jet flights. The majority of the world's air traffic falls into this category which covers a large range of activities, both commercial and non-commercial. As such, ...
- ArticleJuly 2015
Towards Action Track 3.0: The Role of Usefulness, Usability, and User Experience in a Startup Company Developing Location-Based Applications
IV '15: Proceedings of the 2015 19th International Conference on Information VisualisationPages 245–254https://doi.org/10.1109/iV.2015.52This paper discusses the role of usefulness, usability, and user experience in a startup company focusing on location-based applications. In just three years, the emphasis of design moved from usefulness to UX, resulting in opening new market segments, ...
- articleApril 2015
Extend your journey: considering signal strength and fluctuation in location-based applications
IEEE/ACM Transactions on Networking (TON), Volume 23, Issue 2Pages 451–464https://doi.org/10.1109/TNET.2014.2301171Reducing the communication energy is essential to facilitate the growth of emerging mobile applications. In this paper, we introduce signal strength into location-based applications to reduce the energy consumption of mobile devices for data reception. ...
- research-articleMarch 2015
Attack-Resilient Mix-zones over Road Networks: Architecture and Algorithms
IEEE Transactions on Mobile Computing (ITMV), Volume 14, Issue 3Pages 495–508https://doi.org/10.1109/TMC.2014.2321747Continuous exposure of location information, even with spatially cloaked resolution, may lead to breaches of location privacy due to statistics-based inference attacks. An alternative and complementary approach to spatial cloaking based location ...
- ArticleSeptember 2014
GPShare: Grid Position Sharing in Non-trusted Environment
ITHINGS '14: Proceedings of the 2014 IEEE International Conference on Internet of Things(iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom)Pages 368–373https://doi.org/10.1109/iThings.2014.68Millions of users a day using location-based social network applications such as Foursquare, Facebook Place, or Google+ to find, share or check-in their locations or point of interest to friends. However, the position may have been disclosed to other ...
- research-articleSeptember 2013
Opportunistic position update protocols for mobile devices
UbiComp '13: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computingPages 787–796https://doi.org/10.1145/2493432.2493439Many location-based applications such as geo-social networks rely on location services storing mobile object positions. To update positions on location servers, position update protocols are used. On the one hand, these protocols decide when an update ...
- research-articleJune 2013
Privacy risk versus socialness in the decision to use mobile location-based applications
ACM SIGMIS Database: the DATABASE for Advances in Information Systems (SIGMIS), Volume 44, Issue 2Pages 19–38https://doi.org/10.1145/2488968.2488971The adoption and use of mobile location-based applications (LBAs) (e.g. Loopt, Gowalla, Foursquare, Facebook Places, My Town) are far behind industry expectations. Drawing on social exchange theory, we present a theoretical framework to examine the cost-...
- research-articleFebruary 2013
Can a Phone's GPS "Lie" Intelligently?
Introducing finer-grained privacy controls would let users divulge only enough location information to achieve a desired service quality.
- research-articleOctober 2012
Improving location recommendations with temporal pattern extraction
- Leandro Balby Marinho,
- Iury Nunes,
- Thomas Sandholm,
- Caio Nóbrega,
- Jordão Araújo,
- Carlos Eduardo Santos Pires
WebMedia '12: Proceedings of the 18th Brazilian symposium on Multimedia and the webPages 293–296https://doi.org/10.1145/2382636.2382698A key challenge in mobile social media applications is how to present personalized content that is both geographically and temporally relevant. In this paper, we propose a new and generic temporal weighting function for improving location ...
- research-articleAugust 2012
Mining the web for points of interest
SIGIR '12: Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrievalPages 711–720https://doi.org/10.1145/2348283.2348379A point of interest (POI) is a focused geographic entity such as a landmark, a school, an historical building, or a business. Points of interest are the basis for most of the data supporting location-based applications. In this paper we propose to ...
- research-articleJune 2010
Improving energy efficiency of location sensing on smartphones
MobiSys '10: Proceedings of the 8th international conference on Mobile systems, applications, and servicesPages 315–330https://doi.org/10.1145/1814433.1814464Location-based applications have become increasingly popular on smartphones over the past years. The active use of these applications can however cause device battery drain owing to their power-intensive location-sensing operations. This paper presents ...
- research-articleJune 2010
Energy-accuracy trade-off for continuous mobile device location
MobiSys '10: Proceedings of the 8th international conference on Mobile systems, applications, and servicesPages 285–298https://doi.org/10.1145/1814433.1814462Mobile applications often need location data, to update locally relevant information and adapt the device context. While most smartphones do include a GPS receiver, it's frequent use is restricted due to high battery drain. We design and prototype an ...
- research-articleSeptember 2009
Hiding stars with fireworks: location privacy through camouflage
MobiCom '09: Proceedings of the 15th annual international conference on Mobile computing and networkingPages 345–356https://doi.org/10.1145/1614320.1614358Individuals face privacy risks when providing personal location data to potentially untrusted location based services (LBSs). We develop and demonstrate CacheCloak, a system that enables realtime anonymization of location data. In CacheCloak, a trusted ...
- articleAugust 2009
Mobile Identity Management Revisited
Electronic Notes in Theoretical Computer Science (ENTCS) (ENTCS), Volume 244Pages 125–137https://doi.org/10.1016/j.entcs.2009.07.044Identity management provides PET (privacy enhancing technology) tools for users to control privacy of their personal data. With the support of mobile location determination techniques based on GPS, WLAN, Bluetooth, etc., context-aware and location-aware ...