Sciweavers

28 search results - page 3 / 6
» Peer-to-Peer Policy Management System for Wearable Mobile De...
Sort
View
ACMSE
2006
ACM
14 years 1 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
CISIS
2010
IEEE
14 years 2 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
ICAC
2007
IEEE
14 years 1 months ago
Energy-Aware Mobile Service Overlays: Cooperative Dynamic Power Management in Distributed Mobile Systems
With their increasingly powerful computational resources and high-speed wireless communications, future mobile systems will have the ability to run sophisticated applications on c...
Balasubramanian Seshasayee, Ripal Nathuji, Karsten...
MOBISYS
2006
ACM
14 years 7 months ago
CoolSpots: reducing the power consumption of wireless mobile devices with multiple radio interfaces
CoolSpots enable a wireless mobile device to automatically switch between multiple radio interfaces, such as WiFi and Bluetooth, in order to increase battery lifetime. The main co...
Trevor Pering, Yuvraj Agarwal, Rajesh K. Gupta, Ro...
AAAI
2007
13 years 9 months ago
Adaptive Timeout Policies for Fast Fine-Grained Power Management
Power management techniques for mobile appliances put the components of the systems into low power states to maximize battery life while minimizing the impact on the perceived per...
Branislav Kveton, Prashant Gandhi, Georgios Theoch...