Sciweavers

WIS
2004
14 years 1 months ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
WIS
2004
14 years 1 months ago
A Wireless Data Stream Mining Model
The sensor networks, web click stream and astronomical applications generate a continuous flow of data streams. Most likely data streams are generated in a wireless environment. Th...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
WIS
2004
14 years 1 months ago
Auctions in mobile multihop ad-hoc networks following the marketplace communication pattern
This paper presents UbiBay, a self-organizing distributed auction system using a mobile multihop ad-hoc network as its sole communication platform. In order to substantially increa...
Hannes Frey, Daniel Görgen, Johannes K. Lehne...
WIS
2004
14 years 1 months ago
Pruning Update Log Files in Intermittently Connected Databases
Modern databases allow mobile clients that subscribe to replicated data, to process the replica without requiring continuous connectivity, and to receive the updates while connecte...
Liton Chakraborty, Ajit Singh, Kshirasagar Naik
WIS
2004
14 years 1 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
WIS
2004
14 years 1 months ago
Ordering in Mobile Networks Using Integrated Sequencers
Distributed applications mostly interact by exchanging messages. For this purpose the messages often need to be ordered. Since today more and more mobile devices are used message o...
Sven Bittner