Sciweavers

1862 search results - page 276 / 373
» Mobile OGSI.NET: Grid Computing on Mobile Devices
Sort
View
97
Voted
WIMOB
2008
IEEE
15 years 9 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg
112
Voted
MUM
2005
ACM
107views Multimedia» more  MUM 2005»
15 years 9 months ago
Retargeting vector animation for small displays
We present a method that preserves the recognizability of key object interactions in a vector animation. The method allows an artist to author an animation once, and then output i...
Vidya Setlur, Yingqing Xu, Xuejin Chen, Bruce Gooc...
140
Voted
WMTE
2008
IEEE
15 years 9 months ago
Context-Aware Writing in Ubiquitous Learning Environments
With the popularization of the wireless network, and the progress of mobile computing technology, the efficiency of the hand-held device is better, and its applications are wider....
Tzung-Shi Chen, Cheng-Sian Chang, Jeng-Shian Lin, ...
113
Voted
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
15 years 8 months ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller
142
Voted
ICECCS
2008
IEEE
183views Hardware» more  ICECCS 2008»
15 years 10 months ago
Ambient Intelligence Applications: Introducing the Campus Framework
A challenge for pervasive computing is the seamless integration of computer support with users’ activities in a very dynamic setting, with deep human and resource mobility. Port...
Amal El Fallah-Seghrouchni, Karin Breitman, Nicola...