Sciweavers

44 search results - page 5 / 9
» The Ubiquitous Interactor - Device Independent Access to Mob...
Sort
View
VTC
2007
IEEE
116views Communications» more  VTC 2007»
14 years 1 months ago
Applicability of a Multi-Mode MAC Protocol
— Future mobile radio networks will have the requirement of very high data rates. Typical wireless data communication will not only occur in short range scenarios like hotspots i...
Arif Otyakmaz, Ismet Aktas, Marc Schinnenburg, Ral...
MOBISEC
2009
Springer
14 years 2 months ago
Extending the Belgian eID Technology with Mobile Security Functionality
The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a lim...
Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vince...
ICDCS
1997
IEEE
13 years 12 months ago
Effect of Connection Rerouting on Application Performance in Mobile Networks
—The increasing deployment of wireless access technology, along with the emergence of high speed integrated service networks, such as ATM, promises to provide mobile users with u...
Partho Pratim Mishra, Mani B. Srivastava
GEOINFO
2004
13 years 9 months ago
Design and Implementation Issues for Explorative Location-based Applications: The NexusRallye
: Explorative Location-based Applications (eLBA), define a new class of applications that rely on both positioning (i.e. location information) and georeferenced information in addi...
Daniela Nicklas, Nicola Hönle, Michael Molten...
ACSAC
2001
IEEE
13 years 11 months ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen