611 | -- | 612 | Jong Hyuk Park, Han-Chieh Chao, Taeshik Shon, Mieso K. Denko. Guest editorial: Theme issue on smartphone applications and services for pervasive computing |
613 | -- | 622 | Stephan Karpischek, Florian Michahelles, Elgar Fleisch. my2cents: enabling research on consumer-product interaction |
623 | -- | 630 | Tobias Langlotz, Stefan Mooslechner, Stefanie Zollmann, Claus Degendorfer, Gerhard Reitmayr, Dieter Schmalstieg. Sketching up the world: in situ authoring for mobile Augmented Reality |
631 | -- | 641 | Hammad Banuri, Masoom Alam, Shahryar Khan, Jawad Manzoor, Bahar Ali, Yasar Khan, Mohsin Yaseen, Mir Nauman Tahir, Tamleek Ali, Quratulain Alam, Xinwen Zhang. An Android runtime security policy enforcement framework |
643 | -- | 654 | Divyan Munirathnam Konidala, Made Harta Dwijaksara, Kwangjo Kim, Dongman Lee, Byoungcheon Lee, Daeyoung Kim 0001, Soontae Kim. Resuscitating privacy-preserving mobile payment with customer in complete control |
655 | -- | 664 | Markus Weiss, Thorsten Staake, Friedemann Mattern, Elgar Fleisch. PowerPedia: changing energy usage with the help of a community-based smartphone application |
665 | -- | 676 | Mattias Rost, Henriette S. M. Cramer, Lars Erik Holmquist. Mobile exploration of geotagged photographs |
677 | -- | 685 | Kyusuk Han, Hyeran Mun, Taeshik Shon, Chan Yeob Yeun, Jong Hyuk Park. Secure and efficient public key management in next generation mobile networks |
687 | -- | 696 | Won Ho Chung. A smartphone watch for mobile surveillance service |
697 | -- | 706 | Yong Lee, Goo Yeon Lee, Hwa Jong Kim, Choong Kyo Jeong. Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j |
707 | -- | 715 | Sangjun Jeon, Jewan Bang, KeunDuck Byun, Sangjin Lee. A recovery method of deleted record for SQLite database |
717 | -- | 727 | Changsu Kim, Roger Johnson, George Roussos, Simon J. Lee. A cross-country comparison of the adoption of ubiquitous supply chain management |
729 | -- | 739 | Steven Cadavid, Mohamed Abdel-Mottaleb, Abdelsalam Helal. Exploiting visual quasi-periodicity for real-time chewing event detection using active appearance models and support vector machines |
741 | -- | 755 | Zakwan Jaroucheh, Xiaodong Liu, Sally Smith. An approach to domain-based scalable context management architecture in pervasive environments |
757 | -- | 766 | Ofer Bergman, Andreas Komninos, Dimitrios Liarokapis, James Clarke. You never call: Demoting unused contacts on mobile phones using DMTR |
767 | -- | 775 | Ben Kirman, Conor Linehan, Shaun W. Lawson. Blowtooth: a provocative pervasive game for smuggling virtual drugs through real airport security |