Sciweavers

1045 search results - page 62 / 209
» Remote Evaluation of Mobile Applications
Sort
View
FC
2008
Springer
134views Cryptology» more  FC 2008»
14 years 8 hour ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
OZCHI
2006
ACM
14 years 4 months ago
iSocialize: investigating awareness cues for a mobile social awareness application
Emerging technologies increasingly provide opportunities for creating and maintaining social relations with people even though separated by time or distance. However, it is still ...
Berith L. Andersen, Martin L. Jørgensen, Ul...
JDIM
2010
157views more  JDIM 2010»
13 years 5 months ago
Case studies on context-aware mobile multimedia services
: This paper explores the design, implementation and evaluation of context-aware mobile multimedia services by presenting six case studies on different application domains. The cas...
Timo Ojala
GIS
2010
ACM
13 years 8 months ago
A data stream-based evaluation framework for traffic information systems
Traffic information systems based on mobile, in-car sensor technology are a challenge for data management systems as a huge amount of data has to be processed in real-time. Data m...
Sandra Geisler, Christoph Quix, Stefan Schiffer
MIDDLEWARE
2010
Springer
13 years 8 months ago
Automatically Generating Symbolic Prefetches for Distributed Transactional Memories
Abstract. Developing efficient distributed applications while managing complexity can be challenging. Managing network latency is a key challenge for distributed applications. We ...
Alokika Dash, Brian Demsky