In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
A challenge for pervasive computing is the seamless integration of computer support with users’ activities in a very dynamic setting, with deep human and resource mobility. Port...
Amal El Fallah-Seghrouchni, Karin Breitman, Nicola...
With the consolidation of the Internet and other computer networks, the need of sophisticated systems to retrieve information increased enormously. In these networks, information ...
Rafael T. de Sousa Jr., Alexandre C. V. de Oliveir...
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
This paper presents a task allocation scheme via selforganizing swarm coalitions for distributed mobile sensor network coverage. Our approach uses the concepts of ant behavior to ...
Kian Hsiang Low, Wee Kheng Leow, Marcelo H. Ang Jr...