Sciweavers

5446 search results - page 160 / 1090
» Mobile computing
Sort
View
IJNSEC
2006
85views more  IJNSEC 2006»
15 years 2 months ago
A Forgery Attack on A Low Computation Cost User Authentication Scheme
In 2005, Lee-Lin-Chang proposed a low computation cost user authentication scheme for mobile communication. However, the current paper demonstrates the vulnerability of Lee-Lin-Ch...
Eun-Jun Yoon, Kee-Young Yoo
ISCC
2008
IEEE
185views Communications» more  ISCC 2008»
15 years 8 months ago
Towards business model and technical platform for the service oriented context-aware mobile virtual communities
: Owing to the recent technical advances in the computing and mobile communications domain, the world of online virtual communities is experiencing a phenomenal growth and ever-inc...
Pravin Pawar, Julien Subercaze, Pierre Maret, Bert...
ICST
2010
IEEE
15 years 5 days ago
GraphSeq: A Graph Matching Tool for the Extraction of Mobility Patterns
Mobile computing systems provide new challenges for verification. One of them is the dynamicity of the system structure, with mobility-induced connections and disconnections, dynam...
Minh Duc Nguyen, Hélène Waeselynck, ...
PERCOM
2003
ACM
16 years 1 months ago
Location-Detection Strategies in Pervasive Computing Environments
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for mov...
Sebastian Fischmeister, Guido Menkhaus, Alexander ...
ICPR
2002
IEEE
16 years 3 months ago
Differential Epipolar Constraint in Mobile Robot Egomotion Estimation
Helder Araújo, Joaquim Salvi, Xavier Armang...