G-Mobile

Results: 622



#Item
61

Nudging Users Towards Privacy on Mobile Devices Rebecca Balebako, Pedro G. Leon, Hazim Almuhimedi, Patrick Gage Kelley, Jonathan Mugan, Alessandro Acquisti, Lorrie Faith Cranor and Norman Sadeh Carnegie Mellon University

Add to Reading List

Source URL: www.jonathanmugan.com

Language: English - Date: 2013-06-05 00:38:24
    62Marketing / Internet marketing / Internet advertising / Advertising / Targeted advertising / Online advertising / Direct marketing / Digital marketing / Web banner / Click-through rate / Mobile advertising / AdWords

    WASTE-FREE ADVERTISING ® Engage shoppers online. Drive sales on premise. D I G I TA L DIRECT

    Add to Reading List

    Source URL: www.placewise.com

    Language: English - Date: 2015-06-19 14:46:14
    63

    Code Injection Attacks on HTML5-based Mobile Apps Xing Jin, Tongbo Luo, Derek G. Tsui, Wenliang Du Dept. of Electrical Engineering & Computer Science, Syracuse University, Syracuse, NY using different languages. If othe

    Add to Reading List

    Source URL: www.mostconf.org

    Language: English - Date: 2014-05-17 09:18:13
      64

      Corina Knipper a, *, Anne-France Maurer b, Daniel Peters c, Christian Meyer a, Michael Braunsd, Stephen J.G. Galer e, Uta von Freeden c, Bernd Schöne b, Harald Meller f, Kurt W. Alt a Mobility in Thuringia or mobile Thu

      Add to Reading List

      Source URL: www.paleontology.uni-mainz.de

      Language: English - Date: 2012-08-03 02:10:52
        65Technology / Computer security / Computing / Mobile security / E-commerce / NowSecure / Mobile app / Mobile device / Mobile business intelligence / Mobile device management

        THE WORLD IS MOBILEA N D S E C U R I N G M O B I L E I S W H AT W E ’ R E A L L A B O U T. BEC AUSE MOBILE IS DIFFERENT What makes mobile so different?

        Add to Reading List

        Source URL: info.nowsecure.com

        Language: English - Date: 2016-02-07 19:35:45
        66

        On Data Caching for Mobile Clouds Ying Feng, Radu Stoleru† , Chien-An Chen† , Geoffrey G. Xie‡ Department of Electrical and Computer Engineering, Texas A&M University † Department of Computer Science and Engineer

        Add to Reading List

        Source URL: faculty.cs.tamu.edu

        Language: English - Date: 2014-11-30 13:16:50
          67

          G-CAN A contemporary operator interface for control and monitoring applications on mobile machinery W: 133mm x H: 113mm x D: 50mm

          Add to Reading List

          Source URL: www.rdstec.com

          Language: English - Date: 2015-01-12 06:13:07
            68

            Exploiting user interest similarity and social links for micro-blog forwarding in mobile opportunistic networks S.M. Allena , M.J. Chorleya , G.B. Colomboa , E. Jahob , M. Karaliopoulosb , I. Stavrakakisb , R.M. Whitaker

            Add to Reading List

            Source URL: martinjc.com

            Language: English - Date: 2012-01-03 06:35:04
              69

              When it comes to loyalty cards and mobile rewards programs, PowerCard is the technology leader. Our specialty is multi-unit and group programs. 14% More Customer returns | Increase Check Average by 2 to 5% S E L L G I F

              Add to Reading List

              Source URL: www.powercard.com

              Language: English - Date: 2015-04-30 14:06:01
                70Computing / Software / Computer architecture / Android / Smartphones / Alphabet Inc. / Intent / Mobile app / Google Play / Malware / Computer virus / Couple

                On the Need of Precise Inter-App ICC Classification for Detecting Android Malware Collusions* Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder Department of Computer Science Virginia Tech Email: {kelish, danfen

                Add to Reading List

                Source URL: ieee-security.org

                Language: English
                UPDATE