Sciweavers

1880 search results - page 115 / 376
» Mobile Application Profiling for Connected Mobile Devices
Sort
View
SELMAS
2004
Springer
15 years 10 months ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...
INFOCOM
2010
IEEE
15 years 3 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
ICC
2008
IEEE
15 years 11 months ago
Using Personal Electronic Device for Authentication-Based Service Access
Abstract—A person usually carries multiple authentication tokens in the form of various cards to access services electronically. Often the service outlets are equipped with a str...
Abhishek Gaurav, Ankit Sharma, Vikas Gelara, Rajat...
GI
2004
Springer
15 years 10 months ago
Policy-Based Context-Management for Mobile Solutions
: Nowadays our world becomes more and more connected, and sensors and any kind of mobile (e.g. cell phones, PDAs) and fixed computational devices are linked together through wired...
Caroline Funk, Björn Schiemann
PERCOM
2010
ACM
14 years 11 months ago
Using Wi-Fi to save energy via P2P remote execution
Abstract-- Mobile devices are becoming increasingly powerful with regards to processing speed, networking capabilities, storage capacity etc. While these improvements open up new p...
Mads Darø Kristensen, Niels Olof Bouvin