Sciweavers

366 search results - page 33 / 74
» A Door Access Control System with Mobile Phones
Sort
View
ACSAC
2007
IEEE
15 years 4 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo
96
Voted
COMCOM
2008
100views more  COMCOM 2008»
14 years 9 months ago
The impact of code allocation on the multiple access interference in WCDMA systems
Code allocation has a significant impact on the performance of Code Division Multiple Access (CDMA) systems. For the uplink direction, in 3G Wideband CDMA (WCDMA) cellular systems...
Thamer Al-Meshhadany, Wessam Ajib
SIGMOD
2009
ACM
153views Database» more  SIGMOD 2009»
15 years 10 months ago
ELMR: lightweight mobile health records
Cell phones are increasingly being used as common clients for a wide suite of distributed, database-centric healthcare applications in developing regions. This is particularly tru...
Arvind Kumar, Amey Purandare, Jay Chen, Arthur Mea...
MADNES
2005
Springer
15 years 3 months ago
An XML Standards Based Authorization Framework for Mobile Agents
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Guillermo Navarro, Joan Borrell
RTDB
2001
114views more  RTDB 2001»
14 years 11 months ago
Mobile Distributed Real-Time Database Systems
Research in the concurrency control of real-time data access over mobile networks is receiving growing attention. With possibly lengthy transmission delay and frequent disconnecti...
Kam-yiu Lam, Tei-Wei Kuo