Sciweavers

644 search results - page 91 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
IJACTAICIT
2010
146views more  IJACTAICIT 2010»
14 years 9 months ago
Modeling and Simulation of a Pervasive Multimodal Multimedia Computing System for Visually-Impaired Users
Using multimodality in a computing system is advantageous in the sense that it makes computing more accessible to a wide range of users including those with impairments. Our work ...
Ali Awde, Moeiz Miraoui, Chakib Tadj, Yacine Belli...
NETGAMES
2003
ACM
15 years 5 months ago
Mobility and stability evaluation in wireless multi-hop networks using multi-player games
Plenty of work was contributed in the field of protocol design and performance evaluation of multi-hop networks. It is generally accepted that mobility has a huge impact on the p...
Frank H. P. Fitzek, Leonardo Badia, Michele Zorzi,...
EGC
2005
Springer
15 years 5 months ago
Interactive Visualization of Grid Monitoring Data on Multiple Client Platforms
Most current Grid monitoring systems provide a visual user interface. With recent advances in multimedia capabilities in user terminals, there is a strong trend towards interactive...
Lea Skorin-Kapov, Igor S. Pandzic, Maja Matijasevi...
PERCOM
2004
ACM
15 years 11 months ago
One-Time Capabilities for Authorizations without Trust
This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Laurent Bussard, Refik Molva
WMASH
2003
ACM
15 years 5 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...