Sciweavers

737 search results - page 15 / 148
» Generative approaches for application tailoring of mobile de...
Sort
View
IPPS
2007
IEEE
14 years 2 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
WOA
2003
13 years 9 months ago
Filling the Gap Between Users and Objects: a Multichannel Interactive Environment
— The design and the implementation of software for mobile computers and for pervasive computing environments entail several issues and lead to new requirements. Applications mus...
Davide Carboni, Andrea Piras, Stefano Sanna, Gavin...
OTM
2004
Springer
14 years 1 months ago
Application of Grid Security to Personal Distributed Environments
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile...
Allan Tomlinson, Scarlet Schwiderski-Grosche
CASCON
2007
63views Education» more  CASCON 2007»
13 years 9 months ago
A search-based approach for dynamically re-packaging downloadable applications
Mechanisms such as Java Web Start enable on-thefly downloading and execution of applications installed on remote servers, without the need for having them installed on the local ...
Thierry Bodhuin, Massimiliano Di Penta, Luigi Troi...
HICSS
2007
IEEE
212views Biometrics» more  HICSS 2007»
14 years 2 months ago
Fully-automatic generation of user interfaces for multiple devices from a high-level model based on communicative acts
The problems involved in the development of user interfaces become even more severe through the ubiquitous use of a variety of devices such as PCs, mobile phones and PDAs. Each of...
Jürgen Falb, Roman Popp, Thomas Röck, He...