Sciweavers

OTM
2004
Springer
13 years 10 months ago
Application of Grid Security to Personal Distributed Environments
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile...
Allan Tomlinson, Scarlet Schwiderski-Grosche
MHCI
2004
Springer
13 years 10 months ago
EMG as a Subtle Input Interface for Mobile Computing
Abstract. Rather than merely imitating the desktop metaphor for mobile devices, new interface paradigms that take into account the particular characteristics of mobility, need to b...
Enrico Costanza, Alberto Perdomo, Samuel A. Invers...
MATA
2004
Springer
113views Communications» more  MATA 2004»
13 years 10 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...
MATA
2004
Springer
13 years 10 months ago
Agents Technology Extended with Mobile Devices
Abstract. This paper presents framework that can be used for improving working conditions. We have extended intelligent agents technology for the Internet with cell phone technolog...
Fábio Calhau, Lino Pereira, Paulo Costa, Lu...
GI
2004
Springer
13 years 10 months ago
Personalized Mobile Multimedia meets Location-Based Services
: When traveling and visiting new places, tourists are mobile as they wander around and follow tours through cities and landscapes. Location-based mobile systems today typically pr...
Susanne Boll, Jens Krösche, Ansgar Scherp
GCC
2004
Springer
13 years 10 months ago
Image-Based Walkthrough over Internet on Mobile Devices
Real-time rendering of complex 3D scene on mobile devices is a challenging task. The main reason is that mobile devices have limited computational capabilities and are lack of powe...
Yu Lei, Zhongding Jiang, Deren Chen, Hujun Bao
EUSAI
2004
Springer
13 years 10 months ago
Remote Code Execution on Ubiquitous Mobile Applications
Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization p...
João Nuno Silva, Paulo Ferreira
AP2PC
2004
Springer
13 years 10 months ago
An Agent Module for a System on Mobile Devices
A Middleware is the software that assists an application to interact or communicate with other applications, networks, hardware, and/or operating systems. We have earlier proposed ...
Praveen Madiraju, Sushil K. Prasad, Rajshekhar Sun...
WS
2004
ACM
13 years 10 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...
UIST
2004
ACM
13 years 10 months ago
A gesture-based authentication scheme for untrusted public terminals
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This...
Shwetak N. Patel, Jeffrey S. Pierce, Gregory D. Ab...