Sciweavers

1862 search results - page 126 / 373
» Mobile OGSI.NET: Grid Computing on Mobile Devices
Sort
View
119
Voted
PERCOM
2004
ACM
16 years 3 months ago
Denial-of-Service Attacks on Battery-powered Mobile Computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
147
Voted
AINA
2009
IEEE
15 years 10 months ago
SOA Initiatives for eLearning: A Moodle Case
— Mobile learning applications introduce a new degree of ubiquitousness in the learning process. There is a new generation of ICT-powered mobile learning experiences that exist i...
María José Casany Guerrero, Marc Ali...
125
Voted
MOBICOM
1996
ACM
15 years 7 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
142
Voted
DSS
2007
113views more  DSS 2007»
15 years 3 months ago
An information delivery system with automatic summarization for mobile commerce
Wireless access with handheld devices is a promising addition to the WWW and traditional electronic business. Handheld devices provide convenience and portable access to the huge ...
Christopher C. Yang, Fu Lee Wang
127
Voted
WEBI
2005
Springer
15 years 9 months ago
Semantic Based Collaborative P2P in Ubiquitous Computing
We propose a collaborative environment for semanticenabled mobile devices (e.g. PDAs, cell phones, laptops) in peer to peer scenarios. Within the environment, resource discovery i...
Michele Ruta, Tommaso Di Noia, Eugenio Di Sciascio...