Sciweavers

901 search results - page 72 / 181
» Secure Internet Applications Based on Mobile Agents
Sort
View
GIS
2008
ACM
14 years 9 months ago
Autonomous navigation of mobile agents using RFID-enabled space partitions
Existing techniques for autonomous indoor navigation are often environment-specific and thus limited in terms of their applicability. In this paper, we take a fundamentally differ...
Muhammad Atif Mehmood, Lars Kulik, Egemen Tanin
PET
2004
Springer
14 years 2 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
ECOOPW
1998
Springer
14 years 24 days ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
SOUPS
2010
ACM
14 years 19 days ago
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit...
OTM
2005
Springer
14 years 2 months ago
Empirical Evaluation of Dynamic Local Adaptation for Distributed Mobile Applications
Distributed mobile applications operate on devices with diverse capabilities, in heterogeneous environments, where parameters such as processor, memory and network utilisation, are...
Pablo Rossi, Caspar Ryan