Sciweavers

267 search results - page 8 / 54
» Wireless Handheld Devices Become Trusted Network Devices
Sort
View
IJNSEC
2006
156views more  IJNSEC 2006»
13 years 7 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
WMCSA
2009
IEEE
14 years 2 months ago
Enabling new mobile applications with location proofs
Location is rapidly becoming the next “killer application” as location-enabled mobile handheld devices proliferate. One class of applications that has yet-to-emerge are those ...
Stefan Saroiu, Alec Wolman
ESWS
2010
Springer
14 years 11 days ago
Mobile Semantic-Based Matchmaking: A Fuzzy DL Approach
Novel wireless handheld devices allow the adoption of revised and adapted discovery approaches originally devised for the Semantic Web in mobile ad-hoc networks. Nevertheless, capa...
Michele Ruta, Floriano Scioscia, Eugenio Di Sciasc...
ICDCSW
2008
IEEE
14 years 2 months ago
Pairing Devices with Good Quality Output Interfaces
The operation of achieving authenticated key agreement between two human-operated devices over a short range wireless communication channel, such as Bluetooth or WiFi, is known as...
Nitesh Saxena, Jonathan Voris
PERCOM
2005
ACM
14 years 7 months ago
Efficient Browsing of Web Search Results on Mobile Devices Based on Block Importance Model
It is expected that more and more people will search the web when they are on the move. Though conventional search engines can be directly visited from mobile devices with web bro...
Xing Xie, Gengxin Miao, Ruihua Song, Ji-Rong Wen, ...