Sciweavers

1283 search results - page 109 / 257
» Atomicity Implementation in Mobile Computing
Sort
View
ACMSE
2006
ACM
14 years 3 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
WORDS
2003
IEEE
14 years 2 months ago
A Resource and QoS Management Framework for a Real-Time Event System in Mobile Ad Hoc Environments
A new class of applications can now be envisaged with the emergence of both mobile ad hoc computing and ubiquitous computing. Applications of such kind are characterised by being ...
Hector A. Duran-Limon, Gordon S. Blair, Adrian Fri...
COORDINATION
2006
Springer
14 years 21 days ago
Using Lime to Support Replication for Availability in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) define a challenging computing scenario where access to resources is restrained by connectivity among hosts. Replication offers an opportunity to in...
Amy L. Murphy, Gian Pietro Picco
ICPR
2010
IEEE
13 years 11 months ago
Coarse-To-Fine Particle Filter by Implicit Motion Estimation for 3D Head Tracking on Mobile Devices
Due to the widely spread mobile devices over the years, a low cost implementation of an efficient head tracking system is becoming more useful for a wide range of applications. In...
Hacheon Sung, Kwontaeg Choi, Hyeran Byun
PUC
2008
113views more  PUC 2008»
13 years 8 months ago
A resource and context model for mobile middleware
Abstract Mobile computing systems should be selfmanaged to simplify operation and maintenance plus meet user's expectation with respect to Quality of Service (QoS). When archi...
Sten Lundesgaard Amundsen, Frank Eliassen