Sciweavers

1610 search results - page 127 / 322
» A Transaction Model for Mobile Computing
Sort
View
UIC
2009
Springer
14 years 3 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
MOBIHOC
2009
ACM
14 years 9 months ago
Aging rules: what does the past tell about the future in mobile ad-hoc networks?
The study in mobile ad-hoc networks (MANET) is facing challenges brought by recent discovery of non-exponential behavior of the inter-contact time distribution of mobile nodes. In...
Han Cai, Do Young Eun
MOBISYS
2005
ACM
14 years 8 months ago
A relative positioning system for co-located mobile devices
If a mobile computing device knows how it is positioned and oriented in relation to other devices nearby, then it can provide enhanced support for multi-device and multi-user inte...
Mike Hazas, Christian Kray, Hans-Werner Gellersen,...
MHCI
2005
Springer
14 years 2 months ago
Rolling, rotating and imagining in a virtual mobile world
New mobile devices can be difficult to use because they give users access to powerful computing devices through small interfaces, which typically have limited input facilities. On...
Lynne Baillie, Harald Kunczier, Hermann Anegg
GC
2004
Springer
14 years 2 months ago
Mobile UML Statecharts with Localities
In this paper an extension of a behavioural subset of UML statecharts for mobile computations is proposed. We study collections of UML objects whose behaviour is given by statechar...
Diego Latella, Mieke Massink, Hubert Baumeister, M...