Sciweavers

304 search results - page 25 / 61
» Trusted Computing in Mobile Action
Sort
View
NCA
2003
IEEE
14 years 28 days ago
AdHocFS: Sharing Files in WLANs
This paper presents the ADHOCFS file system for mobile users, which realizes transparent, adaptive file access according to the users’ specific situations (e.g., device in us...
Malika Boulkenafed, Valérie Issarny
HUC
2005
Springer
14 years 1 months ago
Living for the Global City: Mobile Kits, Urban Interfaces, and Ubicomp
Using ethnographic methods, 28 young professionals across the global cities of London, Los Angeles, and Tokyo were studied to understand in some detail what items they carried with...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
IROS
2008
IEEE
122views Robotics» more  IROS 2008»
14 years 2 months ago
Positioning mobile manipulators to perform constrained linear trajectories
Abstract— For mobile manipulators envisioned in home environments a kitchen scenario provides a challenging testbed for numerous skills. Diverse manipulation actions are required...
Franziska Zacharias, Christoph Borst, Michael Beet...
MM
2004
ACM
116views Multimedia» more  MM 2004»
14 years 1 months ago
First-year students' paper chase: a mobile location-aware multimedia game
The latest achievements in the field of mobile networks and ubiquitous computing enable the integration and combination of technologies like Internet, Java, and multimedia in a n...
Palle Klante, Jens Krösche, Daniela Ratt, Sus...
WIMOB
2008
IEEE
14 years 2 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...