Sciweavers

674 search results - page 46 / 135
» Distributed Certified Information Access for Mobile Devices
Sort
View
IEEEIA
2009
14 years 9 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
ISCI
2002
132views more  ISCI 2002»
14 years 11 months ago
Mobile data and transaction management
Mobile computing paradigm has emerged due to advances in wireless or cellular networking technology. This rapidly expanding technology poses many challenging research problems in ...
Sanjay Kumar Madria, Mukesh K. Mohania, Sourav S. ...
IUI
2009
ACM
15 years 8 months ago
Searching large indexes on tiny devices: optimizing binary search with character pinning
The small physical size of mobile devices imposes dramatic restrictions on the user interface (UI). With the ever increasing capacity of these devices as well as access to large o...
Guy Shani, Christopher Meek, Tim Paek, Bo Thiesson...
WWW
2001
ACM
16 years 15 days ago
Seeing the whole in parts: text summarization for web browsing on handheld devices
We introduce five methods for summarizing parts of Web pages on handheld devices, such as personal digital assistants (PDAs), or cellular phones. Each Web page is broken into text...
Orkut Buyukkokten, Hector Garcia-Molina, Andreas P...
IJWIS
2006
91views more  IJWIS 2006»
14 years 11 months ago
Handheld Computing and Programming for Mobile Commerce
: Using Internet-enabled mobile handheld devices to access the World Wide Web is a promising addition to the Web and traditional e-commerce. Mobile handheld devices provide conveni...
Wen-Chen Hu, Jyh-haw Yeh, Lixin Fu, Hung-Jen Yang