Sciweavers

56 search results - page 6 / 12
» Software security aspects of Java-based mobile phones
Sort
View
UIST
2000
ACM
14 years 1 months ago
Sensing techniques for mobile interaction
We describe sensing techniques motivated by unique aspects of human-computer interaction with handheld devices in mobile settings. Special features of mobile interaction include c...
Ken Hinckley, Jeffrey S. Pierce, Mike Sinclair, Er...
SSR
2001
104views more  SSR 2001»
13 years 10 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
EWSA
2004
Springer
14 years 2 months ago
An Architecture Description Language for Mobile Distributed Systems
Mobile software applications have to meet new requirements directly arising from mobility issues. To address these requirements at an early stage in development, an architecture d...
Volker Gruhn, Clemens Schäfer
SACMAT
2004
ACM
14 years 2 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
ICASSP
2008
IEEE
14 years 3 months ago
Speech privacy for modern mobile communication systems
Speech privacy techniques are used to scramble clear speech into an unintelligible signal in order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have ...
Jose Francisco de Andrade, Marcello Luiz Rodrigues...