Sciweavers

148 search results - page 11 / 30
» Implementing identity provider on mobile phone
Sort
View
MOBISYS
2007
ACM
14 years 8 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
IAT
2008
IEEE
14 years 3 months ago
Social and Personal Context Modeling for Contact List Recommendation on Mobile Device
This paper presents a social and personal context modeling method on mobile device. It infers user’s contexts, such as amity with others and emotional state, from uncertain logs...
Jun-Ki Min, Hee-Taek Kim, Sung-Bae Cho
MSWIM
2006
ACM
14 years 3 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda
DBKDA
2009
IEEE
238views Database» more  DBKDA 2009»
14 years 8 days ago
MyMIDP: An JDBC Driver for Accessing MySQL from Mobile Devices
Cell phones are no longer merely used to make phone calls or to send short or multimedia messages. They more and more become information systems clients. Recent developments in th...
Hagen Höpfner, Jörg Schad, Sebastian Wen...
AICT
2006
IEEE
109views Communications» more  AICT 2006»
14 years 3 months ago
mTag - Architecture for Discovering Location Specific Mobile Web Services Using RFID and Its Evaluation with Two Case Studies
This paper introduces mTag, a distributed eventdriven architecture for discovering location specific mobile web services. Service discovery is initiated by touching a fixed RFID r...
Jani Korhonen, Timo Ojala, Mikko Klemola, Pasi Vaa...