Sciweavers

494 search results - page 5 / 99
» An implementation and evaluation of a mobile hotspot
Sort
View
MATA
2004
Springer
113views Communications» more  MATA 2004»
14 years 26 days ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...
MOBISYS
2005
ACM
14 years 7 months ago
Design and implementation of a single system image operating system for ad hoc networks
In this paper, we describe the design and implementation of a distributed operating system for ad hoc networks. Our system simplifies the programming of ad hoc networks and extend...
Hongzhou Liu, Tom Roeder, Kevin Walsh, Rimon Barr,...
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
14 years 1 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
ECIS
2004
13 years 9 months ago
An empirical assessment of the business value derived from implementing mobile technology: a case study of two organisations
Mobile technologies are argued to offer unprecedented opportunities for organizations and individuals. In order for organizations to be persuaded that investment in mobile technol...
Helana Scheepers, Judy McKay
MA
2001
Springer
175views Communications» more  MA 2001»
13 years 12 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....