Sciweavers

17082 search results - page 14 / 3417
» Abstractions for Mobile Computation
Sort
View
MATA
2004
Springer
113views Communications» more  MATA 2004»
14 years 2 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...
GIS
2002
ACM
13 years 8 months ago
Metadata modeling in a global computing environment
Emerging computational paradigms such as global and ubiquitous computing require some rethinking and innovative research ideas in many computer science areas. In this work, we aim...
Dieter Pfoser, Evaggelia Pitoura, Nectaria Tryfona
HUC
2003
Springer
14 years 2 months ago
Is Context-Aware Computing Taking Control away from the User? Three Levels of Interactivity Examined
Abstract. Context-aware computing promises a smooth interaction between humans and technology but few studies have been conducted with regards to how autonomously an application sh...
Louise Barkhuus, Anind K. Dey
BROADNETS
2005
IEEE
14 years 2 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
MATES
2005
Springer
14 years 2 months ago
CASCOM: Context-Aware Service Co-ordination in Mobile P2P Environments
Abstract. The research project CASCOM (Context-aware Business Application Service Co-ordination in Mobile Computing Environments) will implement, validate, and trial value-added su...
Heikki Helin, Matthias Klusch, António Lope...