Sciweavers

1610 search results - page 214 / 322
» A Transaction Model for Mobile Computing
Sort
View
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
16 years 4 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
MOBILITY
2009
ACM
15 years 8 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
MOBIHOC
2000
ACM
15 years 8 months ago
Content based multicast (CBM) in ad hoc networks
Abstract— This paper presents a radically new multicast model for ad hoc wireless networks. In this model, the content of the multicast data determines the receiver set for the d...
Hu Zhou, Suresh Singh
AINA
2006
IEEE
15 years 7 months ago
Refining WiFi Indoor Positioning Renders Pertinent Deploying Location-Based Multimedia Guide
If outdoor positioning is widely treated and quite precise, indoor or more generally in heterogeneous environment, the positioning (and also mobility prediction) requires conseque...
Frederic Lassabe, Philippe Canalda, Pascal Chatonn...
CSE
2009
IEEE
15 years 10 months ago
Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery
—The hidden knowledge in social networks data can be regarded as an important resource for criminal investigations which can help finding the structure and organization of a crim...
Amin Milani Fard, Martin Ester