Sciweavers

304 search results - page 28 / 61
» Trusted Computing in Mobile Action
Sort
View
CHI
2005
ACM
14 years 8 months ago
Toss-it: intuitive information transfer techniques for mobile devices
In recent years, mobile devices have rapidly penetrated into our daily lives. However, several drawbacks of mobile devices have been mentioned so far. The proposed system called T...
Koji Yatani, Koiti Tamura, Keiichi Hiroki, Masanor...
EICS
2009
ACM
13 years 11 months ago
Plug-and-design: embracing mobile devices as part of the design environment
Due to the large amount of mobile devices that continue to appear on the consumer market, mobile user interface design becomes increasingly important. The major issue with many ex...
Jan Meskens, Kris Luyten, Karin Coninx
MWCN
2004
Springer
14 years 1 months ago
Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience
: In Mobile Ad Hoc Networks (MANETs), all participating hosts are obligated to route and forward data for others to guarantee the availability of network applications and services....
Ning Jiang, Kien A. Hua, Mounir A. Tantaoui
WICON
2008
13 years 9 months ago
Lightweight management of scalable and personalised media in mobile IPTV networks
In the present paper a novel system for scalable and personalised media management and its architecture is presented. The proposed solution is based on the creation of a secure an...
Laura Arnaiz, Lara García, Federico Alvarez...
STORAGESS
2005
ACM
14 years 1 months ago
Pvault: a client server system providing mobile access to personal data
In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The maj...
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalin...