Sciweavers

589 search results - page 44 / 118
» Evaluating mobile phones as risk information providers
Sort
View
DEXAW
2005
IEEE
116views Database» more  DEXAW 2005»
14 years 2 months ago
Security Analysis of Mobile Java
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
ICNP
2003
IEEE
14 years 2 months ago
Mobile Distributed Information Retrieval for Highly-Partitioned Networks
We propose and evaluate a mobile, peer-to-peer Information Retrieval system. Such a system can, for example, support medical care in a disaster by allowing access to a large colle...
Katrina M. Hanna, Brian Neil Levine, R. Manmatha
IEEECIT
2010
IEEE
13 years 7 months ago
The Strategy of Advancing Mobile Web Application's Layout and Drawing
As the time of mobile Internet has come gently, the mobile applications has progressively designed by techniques based on web technology. The web technology has a lot of strong po...
Liankui Qiu, Panlong He, Lei Luo
HICSS
2007
IEEE
212views Biometrics» more  HICSS 2007»
14 years 3 months ago
Fully-automatic generation of user interfaces for multiple devices from a high-level model based on communicative acts
The problems involved in the development of user interfaces become even more severe through the ubiquitous use of a variety of devices such as PCs, mobile phones and PDAs. Each of...
Jürgen Falb, Roman Popp, Thomas Röck, He...
FIS
2010
13 years 6 months ago
An Authoring Tool for User Generated Mobile Services
Imagine what kind of applications become possible when our mobile devices not only present data but provide valuable information to other users. Users become able to instantaneousl...
José Danado, Marcin Davies, Paulo Ricca, An...