Sciweavers

304 search results - page 29 / 61
» Trusted Computing in Mobile Action
Sort
View
SACMAT
2010
ACM
14 years 15 days ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
MOBISYS
2008
ACM
14 years 7 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
TCS
2008
13 years 7 months ago
Self-deployment of mobile sensors on a ring
Mobile sensors can self-deploy in a purely decentralized and distributed fashion, so to reach in finite time a state of static equilibrium in which they cover uniformly the enviro...
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro
JIT
1999
Springer
81views Database» more  JIT 1999»
13 years 12 months ago
A Jini-based Gateway Architecture for Mobile Devices
In the near future we expect a widespread deployment of mobile computational resources including network-enabled end devices like Laptops and PDAs. An interesting problem then and ...
Gerd Aschemann, Roger Kehr, Andreas Zeidler
IWANN
2009
Springer
14 years 2 months ago
Integrating Graph-Based Vision Perception to Spoken Conversation in Human-Robot Interaction
In this paper we present the integration of graph-based visual perception to spoken conversation in human-robot interaction. The proposed architecture has a dialogue manager as the...
Wendy Aguilar, Luis A. Pineda