In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
This paper proposes a novel Web page segmentation method for mobile browsing, aiming to break a Web page into visually and semantically coherent units fitted to the limited screen ...
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
Control of mobile networks raises fundamental and novel problems in controlling the structure of the resulting dynamic graphs. In particular, in applications involving mobile senso...
With the development of wireless communication and portable devices, people can now enjoy the benefits of mobile computing. But due to the nature and design of portable devices, i...