Sciweavers

1880 search results - page 100 / 376
» Mobile Application Profiling for Connected Mobile Devices
Sort
View
CORR
2010
Springer
89views Education» more  CORR 2010»
15 years 4 months ago
SHIELD: Social sensing and Help In Emergency using mobiLe Devices
School and College campuses face a perceived threat of violent crimes and require a realistic plan against unpredictable emergencies and disasters. Existing emergency systems (e.g....
Gautam S. Thakur, Mukul Sharma, Ahmed Helmy
ICN
2005
Springer
15 years 10 months ago
Quality Adapted Backlight Scaling (QABS) for Video Streaming to Mobile Handheld Devices
Abstract. For a typical portable handheld device, the backlight accounts for a significant percentage of the total energy consumption (e.g., around 30% for a Compaq iPAQ 3650). Su...
Liang Cheng, Stefano Bossi, Shivajit Mohapatra, Ma...
MMS
2006
15 years 4 months ago
Using Private and Public Context - An Approach for Mobile Discovery and Search Services
Abstract: When using context information for the customization of mobile applications, privacy issues are important as users want to limit the amount of context information that is...
Thomas Butter, Sina Deibert, Franz Rothlauf
WIOPT
2005
IEEE
15 years 10 months ago
An Interactive Transparent Protocol for Connection Oriented Mobility -- Performance Analysis with Voice Traffic
Loss-Free handoff in Mobile Networks is an extensive research area. Mobile IP (MIP) provided a solution to enable a mobile node to roam from one location to another while maintain...
Raid Zaghal, Sandeep Davu, Javed I. Khan
145
Voted
UIC
2009
Springer
15 years 11 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...