Sciweavers

1746 search results - page 267 / 350
» Current and future applications of mobile and wireless netwo...
Sort
View
UIC
2009
Springer
14 years 3 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
JSS
2008
97views more  JSS 2008»
13 years 8 months ago
XML security - A comparative literature review
Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML S...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Mark...
IWEC
2004
13 years 10 months ago
Sound Pryer: Adding Value to Traffic Encounters with Streaming Audio
We present a novel in-car entertainment application that is inspired by listening to music and the social interaction of manoeuvring in traffic. The Sound Pryer is a peer-to-peer a...
Mattias Östergren
CORR
2010
Springer
103views Education» more  CORR 2010»
13 years 7 months ago
Structural Solutions to Dynamic Scheduling for Multimedia Transmission in Unknown Wireless Environments
In this paper, we propose a systematic solution to the problem of scheduling delay-sensitive media data for transmission over time-varying wireless channels. We first formulate th...
Fangwen Fu, Mihaela van der Schaar
ISCA
2009
IEEE
161views Hardware» more  ISCA 2009»
14 years 3 months ago
AnySP: anytime anywhere anyway signal processing
In the past decade, the proliferation of mobile devices has increased at a spectacular rate. There are now more than 3.3 billion active cell phones in the world—a device that we...
Mark Woh, Sangwon Seo, Scott A. Mahlke, Trevor N. ...