Sciweavers

339 search results - page 60 / 68
» Distributed caching of multi-dimensional data in mobile envi...
Sort
View
PE
2002
Springer
158views Optimization» more  PE 2002»
14 years 9 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
WMCSA
2009
IEEE
15 years 4 months ago
Context-aware composition
Context–Aware Composition is a technique to overcome the complexity of wireless discovery, device selection, and establishing connections to other computers in an environment wh...
Kent Lyons, Roy Want, David Munday, Jiasheng He, S...
HCI
2007
14 years 11 months ago
An RFID-Based Point-and-Listen Interface Providing Library Access for the Visually Impaired
Abstract. We present the AudioIndex prototype, a light-weight mobile RFIDbased point-and-listen interface that allows visually impaired to browse and search for audio books within ...
Daniel Fallman, Kent Lindbergh, Oskar Fjellstrom, ...
84
Voted
ICPPW
2003
IEEE
15 years 2 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
MOBISYS
2008
ACM
15 years 9 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...