Sciweavers

494 search results - page 40 / 99
» An implementation and evaluation of a mobile hotspot
Sort
View
BIS
2007
144views Business» more  BIS 2007»
13 years 9 months ago
Automated Integration Tests for Mobile Applications in Java 2 Micro Edition
Applications written for mobile devices have become more and more complex, adjusting to the constantly improving computational power of hardware. With the growing application size ...
Dawid Weiss, Marcin Zduniak
SCANGIS
2003
13 years 9 months ago
Mobile E-Commerce and Location-Based Services: Technology and Requirements
Advances in Internet and network technology and the rapidly growing number of mobile personal devices result in the fast growth of Mobile E-Commerce, M-Commerce. In this paper we v...
Aphrodite Tsalgatidou, Jari Veijalainen, Jouni Mar...
PUC
2010
114views more  PUC 2010»
13 years 6 months ago
Mobile phone-based pervasive fall detection
Falls are a major health risk that diminishes the quality of life among the elderly people. The importance of fall detection increases as the elderly population surges, especially ...
Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Sh...
WWW
2011
ACM
13 years 2 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
IACR
2011
137views more  IACR 2011»
12 years 7 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...