Users often forget or misplace mobile devices, e.g., smartphones. To find or recover such devices, users can utilize find my device features, if available on the device, cause the device to emit a sound, etc. However, no mechanisms exist for a device to automatically detect that it is lost or about to be lost. Per techniques described herein, an on-device predictor determines that a device is lost (separated from the owner) or is about to be lost. The prediction is based on various factors, including device sensor data, recent use of apps, recent user context, etc. for which the user has provided access. If it is determined that the device is lost, various mitigating actions as permitted by the user are performed. For example, such actions ...
As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based servic...
Mobile digital devices have evolved from telecommunications device to a lifestyle product over the y...
The objective of this paper is to form an application “Theft Monitoring” wherever we have a tendency...
This paper describes the successful implementation of a prototype software application that independ...
The transmitting and receiving capabilities of a device are turned off when it is put in airplane mo...
As Mobile devices become an essential necessity in our daily lifestyle, having a secured storage for...
With mobile devices becoming exceedingly popular and greatly affordable, there is an ever growing nu...
AbstractPhone lost has been a major problem these days. This case can happened because of the user o...
A mobile device such as a smartphone may analyze acceleration data to determine when the mobile devi...
For the past several decades, designers have processed security for a wide variety of applications f...
There is a wide variety of times when it is unacceptable to be using a smartphone, and this device c...
AbstractThis paper presents a software development on Android Platform which applies cell identifier...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Portable devices, su...
The global information rich society is increasingly dependent on mobile phone technology for daily a...
Forget your smartphone in the car again? This happens often in our daily lives, sometimes even makes...
As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based servic...
Mobile digital devices have evolved from telecommunications device to a lifestyle product over the y...
The objective of this paper is to form an application “Theft Monitoring” wherever we have a tendency...
This paper describes the successful implementation of a prototype software application that independ...
The transmitting and receiving capabilities of a device are turned off when it is put in airplane mo...
As Mobile devices become an essential necessity in our daily lifestyle, having a secured storage for...
With mobile devices becoming exceedingly popular and greatly affordable, there is an ever growing nu...
AbstractPhone lost has been a major problem these days. This case can happened because of the user o...
A mobile device such as a smartphone may analyze acceleration data to determine when the mobile devi...
For the past several decades, designers have processed security for a wide variety of applications f...
There is a wide variety of times when it is unacceptable to be using a smartphone, and this device c...
AbstractThis paper presents a software development on Android Platform which applies cell identifier...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Portable devices, su...
The global information rich society is increasingly dependent on mobile phone technology for daily a...
Forget your smartphone in the car again? This happens often in our daily lives, sometimes even makes...
As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based servic...
Mobile digital devices have evolved from telecommunications device to a lifestyle product over the y...
The objective of this paper is to form an application “Theft Monitoring” wherever we have a tendency...