In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Abstract A key concern in multi-hop wireless networks is energy-efficiency due to batterypower constrained mobile nodes. The network interface is a significant consumer of energy...
Albert F. Harris III, Cigdem Sengul, Robin Kravets...
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
In this paper previous work on the detection of high-level concepts within multimedia documents is extended by introducing a mid-level ontology as a means of exploiting the visual ...
Evaggelos Spyrou, Phivos Mylonas, Yannis S. Avrith...
Multimedia applications for mobile devices, such as video/audio streaming, process streams of incoming data in a regular, predictable way. Content-aware optimizations through anno...