This paper describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate tha...
Exception handling and replication are two mechanisms that increase software reliability. Exception handling helps programmers control situations in which the normal flow of a pro...
We describe a prototype system that combines together the overlaid 3D graphics of augmented reality with the untethered freedom of mobile computing. The goal is to explore how the...
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm mo...
Argumentative discussions are common in Web 2.0 applications, but the social Web still offers limited or no explicit support for argumentation. As Web 2.0 applications become more ...