Sciweavers

85 search results - page 4 / 17
» Verifying resource access control on mobile interactive devi...
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
ICAS
2005
IEEE
171views Robotics» more  ICAS 2005»
14 years 1 months ago
AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure
Access to Grid services is currently limited to devices having substantial computing, network and memory resources such as PCs. On the other hand, most of mobile devices do not ha...
Ali Sajjad, Hassan Jameel, Umar Kalim, Sangman Han...
NBIS
2007
Springer
14 years 1 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
CHI
2008
ACM
14 years 8 months ago
A diary study of mobile information needs
Being mobile influences not only the types of information people seek but also the ways they attempt to access it. Mobile contexts present challenges of changing location and soci...
Timothy Sohn, Kevin A. Li, William G. Griswold, Ja...
CEC
2010
IEEE
13 years 6 months ago
Mobile interface for adaptive image refinement using interactive evolutionary computing
— Due to developing mobile devices and providing services like mobile blogs, people can easily share their thought and experience, at any place and any time. A picture is an impo...
Tae-min Jung, Youngseol Lee, Sung-Bae Cho