Sciweavers

683 search results - page 49 / 137
» Exploiting Logical Mobility in Mobile Computing Middleware
Sort
View
SAC
2009
ACM
15 years 4 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
SAC
2005
ACM
15 years 3 months ago
MoCha-pi, an exogenous coordination calculus based on mobile channels
In this paper we present MoCha-π, an exogenous coordination calculus that is based on mobile channels. A mobile channel is a coordination primitive that allows anonymous point-to...
Juan Guillen Scholten, Farhad Arbab, Frank S. de B...
HPCC
2005
Springer
15 years 3 months ago
Exploring Regression for Mining User Moving Patterns in a Mobile Computing System
In this paper, by exploiting the log of call detail records, we present a solution procedure of mining user moving patterns in a mobile computing system. Specifically, we propose ...
Chih-Chieh Hung, Wen-Chih Peng, Jiun-Long Huang
DAC
2006
ACM
15 years 10 months ago
Systems for human-powered mobile computing
This article outlines several projects aimed at generating electrical energy by passively tapping a variety of human body sources and activities. After summarizing different energ...
Joseph A. Paradiso
PPPJ
2006
ACM
15 years 3 months ago
Enabling Java mobile computing on the IBM Jikes research virtual machine
Today’s complex applications must face the distribution of data and code among different network nodes. Java is a wide-spread language that allows developers to build complex so...
Giacomo Cabri, Letizia Leonardi, Raffaele Quitadam...