Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changi...
Farshad A. Samimi, Philip K. McKinley, Seyed Masou...
User Interface between user and information systems has a great role in system adoption. Based on technology acceptance model, acceptance of a system is explained as a function of...
Nowadays, users not only want to watch digital videos on a PC but also use mobile devices to play back multimedia content. Video adaptation algorithms enable the visualization of ...
In mobile collaborative applications, collaborators may move across heterogeneous environments. This paper proposes object models for seamless transition of collaborators across h...