Sciweavers

885 search results - page 127 / 177
» Middleware for Mobile Information Access
Sort
View
HUC
2005
Springer
14 years 2 months ago
Living for the Global City: Mobile Kits, Urban Interfaces, and Ubicomp
Using ethnographic methods, 28 young professionals across the global cities of London, Los Angeles, and Tokyo were studied to understand in some detail what items they carried with...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
ESORICS
2000
Springer
14 years 18 days ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ADB
1994
311views Database» more  ADB 1994»
14 years 1 months ago
A Personal and Portable Database Server: the CQL Card
Database applications and technologies are of central importance in many information systems a person may encounter. To obtain services, the end-users are required a smart card (pl...
Pierre Paradinas, Jean-Jacques Vandewalle
ACMSE
2006
ACM
14 years 3 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
JCP
2008
115views more  JCP 2008»
13 years 9 months ago
Practical Chip-level Equalizers in HSDPA
High-speed downlink packet access (HSDPA) has been developed to upgrade the current WCDMA system in yerms of providing a higher data rate for mobile users. To ensure a downlink spe...
Minjae Park, Woonsik Lee, Minh-Viet Nguyen, Hwang ...