Sciweavers

6662 search results - page 193 / 1333
» Mobile and Ubiquitous Computing
Sort
View
CSREAEEE
2006
120views Business» more  CSREAEEE 2006»
15 years 6 months ago
Object Caching Model for Cell Phone Mobile Database
- Inherent limitations of mobile computing environment such as limited bandwidth, limited resourced mobile phones, and instability of wireless environment require summarized mobile...
Khubaib Ahmed Qureshi
146
Voted
SAC
2002
ACM
15 years 4 months ago
Secure mobile agent systems using Java: where are we heading?
Java is the predominant language for mobile agent systems, both for implementing mobile agent execution environments and for writing mobile agent applications. This is due to inhe...
Walter Binder, Volker Roth
WWW
2001
ACM
16 years 5 months ago
Map adaptation for users of mobile systems
Display characteristics, network Quality of Service, and the user's current task all exhibit a wide range of variation when users interact with mobile and ubiquitous devices....
Dan Chalmers, Morris Sloman, Naranker Dulay
129
Voted
MOBISEC
2009
Springer
15 years 11 months ago
Extending the Belgian eID Technology with Mobile Security Functionality
The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a lim...
Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vince...
CHI
2004
ACM
16 years 4 months ago
Ambient agoras: InfoRiver, SIAM, Hello.Wall
This demonstration reports results from the EU-funded project Ambient Agoras, investigating future applications of ubiquitous and ambient computing in workspaces. Instead of prese...
Thorsten Prante, Richard Stenzel, Carsten Röc...