Sciweavers

100 search results - page 17 / 20
» Adapting Content for Mobile Devices in Heterogeneous Collabo...
Sort
View
ADT
2010
13 years 7 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
HUC
1999
Springer
13 years 12 months ago
QoS and Context Awareness for Mobile Computing
Systems must provide for mobile applications to be aware of the context in which they are being used. This is necessary to permit adaptation to heterogeneity of hosts and networks...
Dan Chalmers, Morris Sloman
IEEESCC
2008
IEEE
14 years 2 months ago
Adaptive Secure Access to Remote Services
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RP...
Hanping Lufei, Weisong Shi, Vipin Chaudhary
IJIM
2007
139views more  IJIM 2007»
13 years 7 months ago
Evaluation Methods on Usability of M-Learning Environments
— Nowadays there are different evaluation methods focused in the assessment of the usability of telematic methods. The assessment of 3rd generation web environments evaluates the...
Teresa Magal Royo, Guillermo Peris-Fajarnés...
CN
2007
115views more  CN 2007»
13 years 7 months ago
Energy-aware QoS for application sessions across multiple protocol domains in mobile computing
The proliferation of heterogeneous devices and diverse networking technologies demands flexible models to guarantee the quality-of-service(QoS) at the application session level, ...
Hanping Lufei, Weisong Shi