Today's user is surrounded by mobile appliances that continuously disrupt his activities through instant message, email and phone call notifications. In this paper, we presen...
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
The paper describes a model-based approach to developing a general tool for localizing faults in applications of data warehouse technology. A model of the application is configured...
As mobile devices, such as laptops, PDAs or mobile phones, are getting more and more ubiquitous and are able to communicate with each other via wireless technologies, the paradigm...
Developing applications and deploying services for mobile users raises a number of issues and challenges that must be successfully addressed before the era of truly ubiquitous com...
Michael J. O'Grady, Gregory M. P. O'Hare, C. Donag...