Sciweavers

4736 search results - page 126 / 948
» Mobile MultiModal presentation
Sort
View
PDCAT
2005
Springer
15 years 10 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
MATA
2004
Springer
149views Communications» more  MATA 2004»
15 years 10 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
134
Voted
ATAL
2006
Springer
15 years 8 months ago
Exploring sensor networks using mobile agents
Today's wireless sensor networks have limited flexibility because their software is static. Mobile agents alleviate this problem by introducing mobile code and state. Mobile ...
Daniel Massaguer, Chien-Liang Fok, Nalini Venkatas...
144
Voted
AVI
2006
15 years 6 months ago
History Unwired: mobile narrative in historic cities
History Unwired (HU, see http://web.mit.edu/frontiers) is a multi-year investigation of the narrative uses of mobile technology in historic cities. In 2004-2005 a team of research...
Michael Epstein, Silvia Vergani
IASTEDSE
2004
15 years 6 months ago
Targeted messages in indoor mobile environment: A software - oriented approach
Considering the advances of wireless, mobile and positioning technologies and the high requirement of the mobile marketing world for reaching as many customers as possible in a pe...
Angeliki Tsilira, Adamantia G. Pateli, Erast Athan...