Sciweavers

3016 search results - page 175 / 604
» Disappearing mobile devices
Sort
View
ICMCS
2007
IEEE
175views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Clicker - An IPTV Remote Control in Your Cell Phone
This paper investigates a novel concept of providing seamless control and portability of an IPTV viewing session. A solution employing a middleware system, a secure hardware token...
Rittwik Jana, Yih-Farn Chen, David C. Gibbon, Yenn...
ICMCS
2006
IEEE
121views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Using P2P Networks for Error Recovery in MBMS Applications
The wireless networks are notoriously error prone and all errors cannot be prevented in real-time communications. The problem of error correction becomes even more challenging in ...
Praveen Sanigepalli, Hari Kalva, Borko Furht
WS
2006
ACM
14 years 3 months ago
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the p...
Dave Singelée, Bart Preneel
COMPSEC
2010
124views more  COMPSEC 2010»
13 years 9 months ago
Runtime monitoring for next generation Java ME platform
Many modern mobile devices, such as mobile phones or Personal Digital Assistants (PDAs), are able to run Java applications, such as games, Internet browsers, chat tools and so on....
Gabriele Costa, Fabio Martinelli, Paolo Mori, Chri...
CSIE
2009
IEEE
14 years 1 months ago
An Efficient Mixed-Mode Execution Environment for C on Mobile Phone Platforms
Mobile devices are constrained in terms of computational power, battery lifetime and memory sizes. Software development for mobile devices is further complicated by application co...
Taekhoon Kim, Sungho Kim, Kirak Hong, Hwangho Kim,...