Sciweavers

1805 search results - page 35 / 361
» Understanding Code Mobility
Sort
View
TIFS
2008
208views more  TIFS 2008»
13 years 9 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
COMPUTER
2006
90views more  COMPUTER 2006»
13 years 10 months ago
Visualizing Information on Mobile Devices
Visualization has a relevant role in almost every domain of computer applications. It is thus natural to think about bringing visualization techniques to mobile devices (such as P...
Luca Chittaro
KES
2005
Springer
14 years 3 months ago
Ontology Modeling and Storage System for Robot Context Understanding
Abstract. A mobile robot that interacts with its environment needs a machineunderstandable representation of objects and their usages. We present an ontology of objects, with gener...
Eric Wang, Yong Se Kim, Hak Soo Kim, Jin Hyun Son,...
IJNSEC
2007
154views more  IJNSEC 2007»
13 years 9 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
ICICS
2010
Springer
13 years 7 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran