Sciweavers

5446 search results - page 260 / 1090
» Mobile computing
Sort
View
107
Voted
DFMA
2005
IEEE
132views Multimedia» more  DFMA 2005»
15 years 8 months ago
Conditional Access in Mobile Systems: Securing the Application
This paper describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate tha...
Eimear Gallery, Allan Tomlinson
MHCI
2004
Springer
15 years 8 months ago
Butler: A Universal Speech Interface for Mobile Environments
Abstract. Speech interfaces are about to be integrated in consumer appliances and embedded systems and are expected to be used by mobile users in ubiquitous computing environments....
Botond Pakucs
152
Voted
CCGRID
2001
IEEE
15 years 6 months ago
While You're Away: A System for Load-Balancing and Resource Sharing Based on Mobile Agents
While You're Away (WYA) is a distributed system that aggregates the computational power of individual computer systems. WYA introduces the notion of Roaming Computations - Ja...
Niranjan Suri, Paul T. Groth, Jeffrey M. Bradshaw
125
Voted
SIGECOM
2000
ACM
152views ECommerce» more  SIGECOM 2000»
15 years 2 months ago
Issues in wireless E-commerce
Many technologies and applications have appeared recently which are directed at mobile computing and the wireless Web. Wireless (or mobile) e-commerce is concerned with conducting...
Peter Tarasewich, Merrill Warkentin