Sciweavers

6781 search results - page 64 / 1357
» Processors for Mobile Applications
Sort
View
MOBISEC
2009
Springer
14 years 2 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
FTDCS
2003
IEEE
14 years 1 months ago
Towards Middleware Services for Mobile Ad-Hoc Network Applications
Mobile ad-hoc networks are typically very dynamic networks in terms of available communication partners, available network resources, connectivity, etc. Furthermore, the end-user ...
Thomas Plagemann, Vera Goebel, Carsten Griwodz, P&...
NCA
2003
IEEE
14 years 1 months ago
Organizing a Distributed Application in a Mobile Ad Hoc Network
A distributed application that operates in an ad hoc network formed by mobile nodes must limit its use of all-to-all communication since the overall capacity of such a network is ...
Cristian Tuduce, Thomas R. Gross
IJNSEC
2006
88views more  IJNSEC 2006»
13 years 7 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
ICSNC
2006
IEEE
14 years 1 months ago
Middleware - An Effort towards Making Mobile Applications Platform Independent
We propose a middleware architecture for GSM mobile phones that makes applications for mobile phones platform independent to a large extent as well as the applications made using ...
Neeraj Gupta, Vishal Srivastav, M. P. S. Bhatia