Sciweavers

5446 search results - page 160 / 1090
» Mobile computing
Sort
View
IJNSEC
2006
85views more  IJNSEC 2006»
13 years 10 months ago
A Forgery Attack on A Low Computation Cost User Authentication Scheme
In 2005, Lee-Lin-Chang proposed a low computation cost user authentication scheme for mobile communication. However, the current paper demonstrates the vulnerability of Lee-Lin-Ch...
Eun-Jun Yoon, Kee-Young Yoo
ISCC
2008
IEEE
185views Communications» more  ISCC 2008»
14 years 4 months ago
Towards business model and technical platform for the service oriented context-aware mobile virtual communities
: Owing to the recent technical advances in the computing and mobile communications domain, the world of online virtual communities is experiencing a phenomenal growth and ever-inc...
Pravin Pawar, Julien Subercaze, Pierre Maret, Bert...
ICST
2010
IEEE
13 years 8 months ago
GraphSeq: A Graph Matching Tool for the Extraction of Mobility Patterns
Mobile computing systems provide new challenges for verification. One of them is the dynamicity of the system structure, with mobility-induced connections and disconnections, dynam...
Minh Duc Nguyen, Hélène Waeselynck, ...
PERCOM
2003
ACM
14 years 10 months ago
Location-Detection Strategies in Pervasive Computing Environments
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for mov...
Sebastian Fischmeister, Guido Menkhaus, Alexander ...
ICPR
2002
IEEE
14 years 11 months ago
Differential Epipolar Constraint in Mobile Robot Egomotion Estimation
Helder Araújo, Joaquim Salvi, Xavier Armang...