Sciweavers

SIGSOFT
2010
ACM
13 years 2 months ago
Software engineering issues for mobile application development
This paper provides an overview of important software engineering research issues related to the development of applications that run on mobile devices. Among the topics are devel...
Anthony I. Wasserman
SECON
2010
IEEE
13 years 2 months ago
Using BGP in a Satellite-Based Challenged Network Environment
Once, satellites were considered an important option for creating global Internet access. However, for a period of time, satellites were supplanted by other ground-based technologi...
Roman Chertov, Kevin C. Almeroth
ISW
2010
Springer
13 years 2 months ago
Implicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these...
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Ch...
ICIP
2010
IEEE
13 years 2 months ago
Dynamic selection of a feature-rich query frame for mobile video retrieval
In this paper, we focus on a new application of mobile visual search: snapping a photo with a mobile device of a video playing on a TV screen to automatically retrieve and stream ...
David M. Chen, Ngai-Man Cheung, Sam S. Tsai, Vijay...
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
13 years 2 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel
TMC
2010
124views more  TMC 2010»
13 years 2 months ago
A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks
—The key feature of many emerging pervasive computing applications is to proactively provide services to mobile individuals. One major challenge in providing users with proactive...
Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Youngki L...
RFIDSEC
2010
13 years 3 months ago
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications for mobile devices are receiving increased interest...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
PERCOM
2010
ACM
13 years 3 months ago
Cloud-assisted mobile desktop search
—With the advent of the Internet, searching for information became a fundamental part of our daily computing. When large storage devices were integrated to our personal computers...
Eemil Lagerspetz, Sasu Tarkoma
MDM
2010
Springer
151views Communications» more  MDM 2010»
13 years 3 months ago
diffeRS: A Mobile Recommender Service
—Thanks to advances in mobile technology, modern mobile devices have become essential companions, assisting their users in attaining their daily tasks. It will not be long before...
Lucia Del Prete, Licia Capra
JNCA
2010
106views more  JNCA 2010»
13 years 3 months ago
A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware
Today’s web applications are more collaborative and are using the standard and ubiquitous Internet protocols. We have earlier developed System on Mobile Devices (SyD) middleware...
Praveen Madiraju, Srilaxmi Malladi, Janaka Balasoo...