Sciweavers

494 search results - page 40 / 99
» An implementation and evaluation of a mobile hotspot
Sort
View
104
Voted
BIS
2007
144views Business» more  BIS 2007»
15 years 2 months ago
Automated Integration Tests for Mobile Applications in Java 2 Micro Edition
Applications written for mobile devices have become more and more complex, adjusting to the constantly improving computational power of hardware. With the growing application size ...
Dawid Weiss, Marcin Zduniak
118
Voted
SCANGIS
2003
15 years 1 months ago
Mobile E-Commerce and Location-Based Services: Technology and Requirements
Advances in Internet and network technology and the rapidly growing number of mobile personal devices result in the fast growth of Mobile E-Commerce, M-Commerce. In this paper we v...
Aphrodite Tsalgatidou, Jari Veijalainen, Jouni Mar...
81
Voted
PUC
2010
114views more  PUC 2010»
14 years 11 months ago
Mobile phone-based pervasive fall detection
Falls are a major health risk that diminishes the quality of life among the elderly people. The importance of fall detection increases as the elderly population surges, especially ...
Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Sh...
119
Voted
WWW
2011
ACM
14 years 7 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
109
Voted
IACR
2011
137views more  IACR 2011»
14 years 7 days ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...