Sciweavers

10284 search results - page 5 / 2057
» Designing for nomadic work
Sort
View
103
Voted
ISICT
2003
15 years 2 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
APSEC
2009
IEEE
14 years 10 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
PERCOM
2005
ACM
16 years 8 days ago
Accessing Ubiquitous Services Using Smart Phones
The integration of Bluetooth service discovery protocol (SDP), and GPRS internet connectivity into phones provides a simple yet powerful infrastructure for accessing services in n...
Nishkam Ravi, Peter Stern, Niket Desai, Liviu Ifto...
WMI
2001
114views more  WMI 2001»
15 years 2 months ago
A scalable, distributed middleware service architecture to support mobile internet applications
Middleware layers placed between user clients and application servers have been used to perform a variety of functions to support the vision of nomadic computing across varying pla...
Thomas Phan, Richard G. Guy, Rajive Bagrodia
119
Voted
JUCS
2008
163views more  JUCS 2008»
15 years 19 days ago
Authoring Social-aware Tasks on Active Spaces
: Social-aware computing is an emerging trend based on ubiquitous computing technologies and collaborative work. A successful design demands a better understanding of group tasks, ...
Roberto F. Arroyo, Miguel Gea, José Luis Ga...