Sciweavers

148 search results - page 16 / 30
» Implementing identity provider on mobile phone
Sort
View
CAISE
2004
Springer
14 years 2 months ago
Process Mining for Ubiquitous Mobile Systems: An Overview and a Concrete Algorithm
Abstract. Ubiquitous Mobile Systems (UMSs) allow for automated capturing of events. Both mobility and ubiquity are supported by electronic means such as mobile phones and PDAs and ...
Ana Karla A. de Medeiros, Boudewijn F. van Dongen,...
MDM
2007
Springer
125views Communications» more  MDM 2007»
14 years 3 months ago
Extending P3P/Appel for Friend Finder
FriendFinder as a location-based service collects location data from mobile users and distributes a particular user’s location upon request. Privacy of users data especially loc...
Emin Islam Tatli
WS
2006
ACM
14 years 2 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
EUC
2005
Springer
14 years 2 months ago
RFIDcover - A Coverage Planning Tool for RFID Networks with Mobile Readers
Abstract. Radio Frequency Identification (RFID) finds use in numerous applications involving item identification and tracking. In a typical application, RFID tags are attached t...
S. Anusha, Sridhar Iyer
CONEXT
2007
ACM
13 years 10 months ago
A next generation internet architecture for mobility and multi-homing support
The current internetworking architecture presents some limitations to naturally support mobility and multi-homing. Among the limitations, the IP semantic overload seems to be a pr...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...