Sciweavers

744 search results - page 98 / 149
» Location Management Based on the Mobility Patterns of Mobile...
Sort
View
TGC
2005
Springer
14 years 2 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
ATAL
2007
Springer
14 years 3 months ago
WS-agreement based resource negotiation in AgentScape
Mobile agents require access to computing resources on heterogeneous systems across the Internet. This demo illustrates how agents can negotiate terms and conditions of resource a...
Michel A. Oey, Reinier J. Timmer, David G. A. Moba...
WISTP
2007
Springer
14 years 3 months ago
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
Walter Bamberger, Oliver Welter, Stephan Spitz
ICCSA
2005
Springer
14 years 2 months ago
Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA
Abstract. Due to an increasing number of portable devices over 785million world Internet users, a support for quality of service (QoS) and security becomes a significant issue in ...
Kwang Chul Jeong, Hyunseung Choo, Sungchang Lee
WH
2010
151views Healthcare» more  WH 2010»
13 years 4 months ago
AndWellness: an open mobile system for activity and experience sampling
Advances in mobile phone technology have allowed phones to become a convenient platform for real-time assessment of a participants health and behavior. AndWellness, a personal dat...
John Hicks, Nithya Ramanathan, Donnie H. Kim, Moha...