This paper describes a middleware architecture with its location inference service (LIS), and an application for context-aware mobile collaboration which is based on this architec...
Hana K. Rubinsztejn, Markus Endler, Vagner Sacrame...
Applications for mobile devices have some restrictions because of the limited capabilities and heterogeneity of these devices. However, their communication capabilities allow the d...
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Distribution of product updates to embedded devices can increase product lifetimes for consumers and boost revenues for vendors. Dynamic provisioning of application solutions to e...
Although inexpensive, high performance computer graphics hardware has become commonly available, its application in the mobile agent and networking fields has thus far been limite...
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
Abstract. This paper presents framework that can be used for improving working conditions. We have extended intelligent agents technology for the Internet with cell phone technolog...
New challenging deployment scenarios are integrating mobile devices with limited and heterogeneous capabilities that roam among wireless access localities during service provisioni...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli