Sciweavers

1482 search results - page 60 / 297
» Mobile and embedded databases
Sort
View
NSDI
2008
14 years 8 days ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
ADC
2005
Springer
82views Database» more  ADC 2005»
14 years 3 months ago
A Two-Phase Commit Protocol for Mobile Wireless Environment
The challenges of wireless and mobile computing environments have attracted the attention of researchers to revisit the conventional implementation of distributed computing paradi...
Nadia Nouali, Anne Doucet, Habiba Drias
DEXAW
2002
IEEE
138views Database» more  DEXAW 2002»
14 years 2 months ago
Middleware for Mobile Information Access
Mobile information access involves retrieving information from wired service providers. Often there are situations where the information is not available from a single service pro...
Dipanjan Chakraborty, Filip Perich, Anupam Joshi, ...
DEXAW
2002
IEEE
148views Database» more  DEXAW 2002»
14 years 2 months ago
STREAMOBILE: Pay-per-View Video Streaming to Mobile Devices Over the Internet
As new mobile communication technologies are becoming broadly available, there is urgent pressure to populate them with services that provide returns for the huge investements mad...
Josep Domingo-Ferrer, Antoni Martínez-Balle...
RIDE
2000
IEEE
14 years 2 months ago
Exploiting Planned Disconnections in Mobile Environments
We present the notion of a distributed database made up entirely of mobile components. Since disconnections will be frequent in such an environment, we develop a disconnection and...
JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi