Sciweavers

5446 search results - page 141 / 1090
» Mobile computing
Sort
View
92
Voted
MOBILITY
2009
ACM
15 years 8 months ago
Widgets mobility
Widgets are becoming a natural way to design small, intuitive application, and their usage is becoming widespread on both the desktop and the mobile world. However, most widgets s...
Jean Le Feuvre, Cyril Concolato, Jean-Claude Dufou...
118
Voted
WIMOB
2008
IEEE
15 years 8 months ago
Improving User Satisfaction in a Ubiquitous Computing Application
—The Smart Party is a ubiquitous computing application based on the Panoply middleware. The Smart Party allows attendees at a party to transparently participate in the selection ...
Kevin Eustice, A. M. Jourabchi, J. Stoops, Peter L...
112
Voted
MOBISYS
2009
ACM
16 years 2 months ago
mFerio: the design and evaluation of a peer-to-peer mobile payment system
In this paper, we present the design and evaluation of a nearfield communication-based mobile p2p payment application called mFerio which is designed to replace cash-based transac...
Rajesh Krishna Balan, Narayan Ramasubbu, Komsit Pr...
118
Voted
NSDI
2008
15 years 4 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
174
Voted
MAS
1998
Springer
172views Communications» more  MAS 1998»
15 years 6 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin