Sciweavers

308 search results - page 29 / 62
» Accessing Ubiquitous Services Using Smart Phones
Sort
View
GRC
2007
IEEE
14 years 2 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
ISEM
2006
112views more  ISEM 2006»
13 years 7 months ago
Ubiquitous computing: connecting Pervasive computing through Semantic Web
Ubiquitous computing refers to building a global computing environment where seamless and invisible access to computing resources is provided to the user. Pervasive computing deal...
Sachin Singh, Sushil Puradkar, Yugyung Lee
MHCI
2009
Springer
14 years 2 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
CSREAEEE
2006
115views Business» more  CSREAEEE 2006»
13 years 9 months ago
A Framework for Smart e-Trader System for UAE Stock Markets
- The fast development in computing and communication has strongly changed the dynamics of financial markets. More people are trading online through the Web instead of using full-s...
Emad Bataineh, Fatma Al Amir, Hanan Ibraheem, Hess...
MIDDLEWARE
2009
Springer
14 years 2 months ago
Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications
Mobile phones are set to become the universal interface to online services and cloud computing applications. However, using them for this purpose today is limited to two configura...
Ioana Giurgiu, Oriana Riva, Dejan Juric, Ivan Kriv...