Sciweavers

280 search results - page 36 / 56
» Device transparency: a new model for mobile storage
Sort
View
CCS
2009
ACM
14 years 8 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...
ACSAC
2000
IEEE
13 years 11 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
IJRR
2006
172views more  IJRR 2006»
13 years 7 months ago
A Haptic Teleoperation Approach Based on Contact Force Control
This paper presents a new teleoperation approach using a virtual spring, and local contact force control on the slave robot. The operational space framework provides the control s...
Jaeheung Park, Oussama Khatib
GRC
2007
IEEE
14 years 1 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
ERCIMDL
1998
Springer
174views Education» more  ERCIMDL 1998»
13 years 11 months ago
Intelligent Multimedia Communication
Multimedia communication is a part of everyday life and its appearance in computer applications is increasing in frequency and diversity. Intelligent or knowledge based computer su...
Mark T. Maybury, Oliviero Stock, Wolfgang Wahlster