One of the most evident characteristics of an ad hoc ubiquitous computing environment is the dynamism of connections. Due to the mobility of nodes, paths between communicating pee...
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Abstract. In this paper we present a demonstration of the Migrantes environment for supporting user interface migration through different devices, including mobile ones and digital...
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
Location-aware advertising is widely touted as the “killer-app” for mobile commerce to flourish. With the imminent rollout of third-generation mobile networks, advances in mul...