Sciweavers

3016 search results - page 6 / 604
» Disappearing mobile devices
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
COMPUTER
2006
90views more  COMPUTER 2006»
13 years 7 months ago
Visualizing Information on Mobile Devices
Visualization has a relevant role in almost every domain of computer applications. It is thus natural to think about bringing visualization techniques to mobile devices (such as P...
Luca Chittaro
ISCC
2003
IEEE
14 years 27 days ago
Supporting Mobile Devices in Gnutella File Sharing Network with Mobile Agents
The use of peer to peer file sharing networks such as Gnutella is proliferating on the Internet, but its use is bandwidth consuming due to the broadcast nature of some peer to pee...
Tim Hsin-Ting Hu, Binh Thai, Aruna Seneviratne
DBSK
2007
98views more  DBSK 2007»
13 years 7 months ago
MTrainSchedule: Combining Web Services and Data Caching on Mobile Devices
Abstract. Despite recent improvements in wireless network protocols and the manufacturing of better, more performant mobile devices, developing mobile applications and services sti...
Iulia Ion, Alexandru Caracas, Hagen Höpfner