Sciweavers

650 search results - page 119 / 130
» Dynamic Device Access for Mobile Users
Sort
View
COMCOM
2010
129views more  COMCOM 2010»
15 years 1 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
ADB
1994
311views Database» more  ADB 1994»
15 years 6 months ago
A Personal and Portable Database Server: the CQL Card
Database applications and technologies are of central importance in many information systems a person may encounter. To obtain services, the end-users are required a smart card (pl...
Pierre Paradinas, Jean-Jacques Vandewalle
95
Voted
SIGCOMM
2009
ACM
15 years 8 months ago
Apprehending joule thieves with cinder
Energy is the critical limiting resource to mobile computing devices. Correspondingly, an operating system must track, provision, and ration how applications consume energy. The e...
Stephen M. Rumble, Ryan Stutsman, Philip Levis, Da...
DRM
2006
Springer
15 years 5 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
DEXA
2003
Springer
149views Database» more  DEXA 2003»
15 years 7 months ago
Capturing Uncertainty in Spatial Queries over Imprecise Data
Emerging applications using miniature electronic devices (e.g., tracking mobile objects using sensors) generate very large amounts of highly dynamic data that poses very high overh...
Xingbo Yu, Sharad Mehrotra