Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Mobile ad-hoc networks are typically very dynamic networks in terms of available communication partners, available network resources, connectivity, etc. Furthermore, the end-user ...
Thomas Plagemann, Vera Goebel, Carsten Griwodz, P&...
A distributed application that operates in an ad hoc network formed by mobile nodes must limit its use of all-to-all communication since the overall capacity of such a network is ...
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
We propose a middleware architecture for GSM mobile phones that makes applications for mobile phones platform independent to a large extent as well as the applications made using ...