In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Today's wireless sensor networks have limited flexibility because their software is static. Mobile agents alleviate this problem by introducing mobile code and state. Mobile ...
Daniel Massaguer, Chien-Liang Fok, Nalini Venkatas...
History Unwired (HU, see http://web.mit.edu/frontiers) is a multi-year investigation of the narrative uses of mobile technology in historic cities. In 2004-2005 a team of research...
Considering the advances of wireless, mobile and positioning technologies and the high requirement of the mobile marketing world for reaching as many customers as possible in a pe...
Angeliki Tsilira, Adamantia G. Pateli, Erast Athan...