Sciweavers

1030 search results - page 110 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
IFIPTM
2010
139views Management» more  IFIPTM 2010»
15 years 2 months ago
Metric Strand Spaces for Locale Authentication Protocols
Abstract. Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent...
F. Javier Thayer, Vipin Swarup, Joshua D. Guttman
ASWEC
2006
IEEE
15 years 10 months ago
Over-the-air Deployment of Applications in Multi-Platform Environments
Over-the-air (OTA) delivery of applications is important to support as it enables easy deployment and upgrades to applications, thereby reducing the disrupting effect which instal...
Tore Fjellheim
HUC
2010
Springer
15 years 5 months ago
Throw your photos: an intuitive approach for sharing between mobile phones and interactive tables
Many approaches have been proposed to connect mobile phones with interactive tables. Most rely on having the phone placed on table all times, which may hinder the overall user exp...
Fadi Chehimi, Enrico Rukzio
FM
2009
Springer
163views Formal Methods» more  FM 2009»
15 years 8 months ago
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks
We study a clock synchronization protocol for the Chess WSN. First, we model the protocol as a network of timed automata and verify various instances using the Uppaal model checker...
Faranak Heidarian, Julien Schmaltz, Frits W. Vaand...
EUROSYS
2011
ACM
14 years 7 months ago
CloneCloud: elastic execution between mobile device and cloud
Mobile applications are becoming increasingly ubiquitous and provide ever richer functionality on mobile devices. At the same time, such devices often enjoy strong connectivity wi...
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, May...