Sciweavers

1283 search results - page 68 / 257
» Atomicity Implementation in Mobile Computing
Sort
View
IJNSEC
2010
324views more  IJNSEC 2010»
13 years 3 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi
SOFSEM
2007
Springer
14 years 3 months ago
A Software Architecture for Shared Resource Management in Mobile Ad Hoc Networks
We provide the implementation results of the distributed mutual exclusion algorithm based on Ricart-Agrawala algorithm for mobile ad hoc networks (MANETs) using the ns2 simulator d...
Orhan Dagdeviren, Kayhan Erciyes
KIVS
2005
Springer
14 years 2 months ago
Epidemic Dissemination of Presence Information in Mobile Instant Messaging Systems
This paper presents an approach for exchanging presence information between users of an instant messaging system in a mobile ad hoc network. As major feature, presence information ...
Christoph Lindemann, Oliver P. Waldhorst
MHCI
2009
Springer
14 years 3 months ago
A preliminary evaluation of head and facial feature tracking for input on mobile devices
This paper discusses the concept of using head and facial feature tracking as an input mechanism for mobile devices. We present our concept and ideas, along with preliminary findi...
Kathryn Carnegie, Stuart Fleming, Esfandiar Ammira...
PDCAT
2005
Springer
14 years 2 months ago
Collaborative MPEG-4 Contents Authoring, Presentation and Interaction in a Mobile Environment
Recent advances in wireless technology and availability of portable devices with networking capabilities made the increasing hot topic, ubiquitous computing become reality. Also, ...
SongLu Li, Sangwook Kim, Sunkyung Kim