Sciweavers

2123 search results - page 67 / 425
» Mobile computing in next generation wireless networks
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
ICCSA
2004
Springer
15 years 9 months ago
Task Modeling in Computer Supported Collaborative Learning Environments to Adapt to Mobile Computing
Using the new wireless technologies, mobile devices with small displays (handhelds, PDAs, mobile phones) are present in many environments. We are interested in the effective use of...
Ana I. Molina, Miguel A. Redondo, Manuel Ortega
AINTEC
2006
Springer
15 years 8 months ago
Modeling Mobility with Behavioral Rules: The Case of Incident and Emergency Situations
Mobility models must scale accordingly to the application and reflect real scenarios in which wireless devices are deployed. Typical examples of scenarios requiring precise mobilit...
Franck Legendre, Vincent Borrel, Marcelo Dias de A...
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
15 years 11 months ago
Testing mobile agent platforms over the air
— Mobile agents are considered a suitable technology to develop applications for wireless environments with limited communication capabilities. Thus, they offer interesting advan...
Oscar Urra, Sergio Ilarri, Eduardo Mena
PEWASUN
2005
ACM
15 years 10 months ago
Characterizing and modeling user mobility in a cellular data network
The demand for cellular data networks is expected to increase with 3G and beyond technologies accompanied by highbandwidth consumer services, such as wireless video and camera pho...
Emir Halepovic, Carey L. Williamson