Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Mobile ad-hoc networks are typically very dynamic networks in terms of available communication partners, available network resources, connectivity, etc. Furthermore, the end-user ...
Thomas Plagemann, Vera Goebel, Carsten Griwodz, P&...
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
We propose a middleware architecture for GSM mobile phones that makes applications for mobile phones platform independent to a large extent as well as the applications made using ...
Abstract. Mobile devices have received much research interest in recent years. Mobility raises new issues such as more dynamic context, limited computing resources, and frequent di...
Tore Fjellheim, Stephen Milliner, Marlon Dumas, Ki...