Sciweavers

ISPDC
2005
IEEE
14 years 5 months ago
A Component-based Software Infrastructure for Ubiquitous Computing
Multiplication of mobile devices and generalized use of wireless networks imply changes on the design and execution of distributed software applications targeting ubiquitous compu...
Areski Flissi, Christophe Gransart, Philippe Merle
ICMB
2005
IEEE
101views Business» more  ICMB 2005»
14 years 5 months ago
Mobile Ticketing System Employing TrustZone Technology
Security in mobile commerce is becoming more important due to increasing demand from users wishing to perform online transactions over mobile devices. Security is one of the criti...
Wan Huzaini Wan Hussin, Paul Coulton, Reuben Edwar...
ICMB
2005
IEEE
76views Business» more  ICMB 2005»
14 years 5 months ago
ZoneIT: Using Short-Range Radios to Control Mobile Device Functionality
This paper describes a prototype system, ZoneIT, for selectively controlling functionality of mobile devices, e.g. ringing of cellular telephones. ZoneIT exploits the fact that ma...
Tim Moors, Marvyn Mei, Agus Salim
ICDCSW
2005
IEEE
14 years 5 months ago
Visual Code Widgets for Marker-Based Interaction
We present a set of graphical user interface elements, called widgets, for 2-dimensional visual codes. The proposed widgets are suitable for printing on paper as well as showing o...
Michael Rohs
ICAS
2005
IEEE
171views Robotics» more  ICAS 2005»
14 years 5 months ago
AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure
Access to Grid services is currently limited to devices having substantial computing, network and memory resources such as PCs. On the other hand, most of mobile devices do not ha...
Ali Sajjad, Hassan Jameel, Umar Kalim, Sangman Han...
HICSS
2005
IEEE
121views Biometrics» more  HICSS 2005»
14 years 5 months ago
Java Architectures for Mobilised Enterprise Systems
The coming generation of mobile phones will enable objects from enterprise systems to be distributed across a range of devices of different scales. This object mobility will provi...
David Parsons
DFMA
2005
IEEE
132views Multimedia» more  DFMA 2005»
14 years 5 months ago
Conditional Access in Mobile Systems: Securing the Application
This paper describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate tha...
Eimear Gallery, Allan Tomlinson
WS
2006
ACM
14 years 5 months ago
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the p...
Dave Singelée, Bart Preneel
W4A
2006
ACM
14 years 5 months ago
Use of RSS feeds for content adaptation in mobile web browsing
While mobile phones are becoming more popular, wireless communication vendors and device manufacturers are seeking new applications for their products. Access to the large corpus ...
Alexander Blekas, John D. Garofalakis, Vasilios St...
W4A
2006
ACM
14 years 5 months ago
Evaluating interfaces for intelligent mobile search
Recent developments in the mobile phone market have led to a significant increase in the number of users accessing the Mobile Internet. Handsets have been improved to support a d...
Karen Church, Barry Smyth, Mark T. Keane