Sciweavers

1054 search results - page 118 / 211
» From Mobility Management to Connectivity Management
Sort
View
SIGMOD
2006
ACM
161views Database» more  SIGMOD 2006»
14 years 9 months ago
Paper-based mobile access to databases
Our demonstration is a paper-based interactive guide for visitors to the world's largest international arts festival that was developed as part of a project investigating new...
Beat Signer, Moira C. Norrie, Michael Grossniklaus...
ADHOCNOW
2006
Springer
14 years 3 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
HIPC
2005
Springer
14 years 3 months ago
Orthogonal Decision Trees for Resource-Constrained Physiological Data Stream Monitoring Using Mobile Devices
Several challenging new applications demand the ability to do data mining on resource constrained devices. One such application is that of monitoring physiological data streams ob...
Haimonti Dutta, Hillol Kargupta, Anupam Joshi
ECOOPW
1998
Springer
14 years 1 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
EMSOFT
2004
Springer
14 years 3 months ago
Model based estimation and verification of mobile device performance
Performance is an important quality attribute that needs to be and managed proactively. Abstract models of the system are not very useful if they do not produce reasonably accurat...
Gopalakrishna Raghavan, Ari Salomaki, Raimondas Le...