For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mo...
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
The vision of ubiquitous computing is one in which resource constrained mobile devices form ad-hoc networks to enable the delivery of services that are sensitive and responsive to...
Conor Muldoon, Gregory M. P. O'Hare, John F. Bradl...
MIS (Mobile Internet Services) architecture is designed for secure connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (Mobile Inte...
Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, M...
With an increasing number of vehicles equipped with embedded computing platforms and advanced wireless technology, general purpose vehicle telematics applications are highly promi...