Sciweavers

73 search results - page 12 / 15
» Efficient Authentication for Mobile and Pervasive Computing
Sort
View
ATAL
2006
Springer
13 years 9 months ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski
MOBISYS
2004
ACM
14 years 5 months ago
NWSLite: A Light-Weight Prediction Utility for Mobile Devices
Computation off-loading, i.e., remote execution, has been shown to be effective for extending the computational power and battery life of resource-restricted devices, e.g., hand-h...
Selim Gurun, Chandra Krintz, Richard Wolski
PERVASIVE
2008
Springer
13 years 5 months ago
Context-aware routing in wireless mesh networks
Wireless mesh networks promise to deliver resilient connectivity among network nodes, allowing data to be relayed seamlessly between mobile clients and infrastructure. Routing is ...
Peizhao Hu, Marius Portmann, Ricky Robinson, Jadwi...
PERCOM
2008
ACM
13 years 12 months ago
Improving Emergency Response to Mass Casualty Incidents
Mass causality incidents generate a sequence of response events from the emergency services, requiring the allocation and use of resources in a timely fashion. In this paper we de...
Marcus Lucas da Silva, Vassilis Kostakos, Mitsuji ...
ICB
2007
Springer
205views Biometrics» more  ICB 2007»
13 years 11 months ago
Embedded Palmprint Recognition System on Mobile Devices
There are increasing requirements for mobile personal identification, e.g. to protect identity theft in wireless applications. Based on built-in cameras of mobile devices, palmprin...
Yufei Han, Tieniu Tan, Zhenan Sun, Ying Hao