Sciweavers

5447 search results - page 111 / 1090
» Environment-Mediated Mobile Computing
Sort
View
MOBISYS
2011
ACM
14 years 7 months ago
Security versus energy tradeoffs in host-based mobile malware detection
The rapid growth of mobile malware necessitates the presence of robust malware detectors on mobile devices. However, running malware detectors on mobile devices may drain their ba...
Jeffrey Bickford, H. Andrés Lagar-Cavilla, ...
DCOSS
2005
Springer
15 years 10 months ago
Multiple Controlled Mobile Elements (Data Mules) for Data Collection in Sensor Networks
Recent research has shown that using a mobile element to collect and carry data mechanically from a sensor network has many advantages over static multihop routing. We have an imp...
David Jea, Arun A. Somasundara, Mani B. Srivastava
TWC
2008
129views more  TWC 2008»
15 years 4 months ago
An Efficient Mobile Authentication Scheme for Wireless Networks
In this paper, an efficient authentication scheme is proposed which is suitable for low-power mobile devices. It uses an elliptic-curve-cryptosystem based trust delegation mechanis...
Caimu Tang, Dapeng Oliver Wu
MOBISYS
2011
ACM
14 years 7 months ago
Odessa: enabling interactive perception applications on mobile devices
Resource constrained mobile devices need to leverage computation on nearby servers to run responsive applications that recognize objects, people, or gestures from real-time video....
Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padman...
IPPS
2003
IEEE
15 years 9 months ago
A Novel Design Technology for Next Generation Ubiquitous Computing Architecture
Modern applications for mobile computing require high performance architectures. On the other hand, there are restrictions such as storage or power consumption. The use of reconï¬...
Carsten Nitsch, Camillo Lara, Udo Kebschull