Sciweavers

744 search results - page 70 / 149
» Location Management Based on the Mobility Patterns of Mobile...
Sort
View
JSW
2008
101views more  JSW 2008»
14 years 9 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
CD
2005
Springer
15 years 3 months ago
Cooperative Component-Based Software Deployment in Wireless Ad Hoc Networks
Abstract. This paper presents a middleware platform we designed in order to allow the deployment of component-based software applications on mobile devices (such as laptops or pers...
Hervé Roussain, Frédéric Guid...
ISW
2010
Springer
14 years 7 months ago
Implicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these...
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Ch...
ATAL
2004
Springer
15 years 3 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
IADIS
2004
14 years 11 months ago
Jill (Just-in-Location Learning)
Wireless technologies are poised to bring major changes in the information infrastructure, transforming communications and facilitating information retrieval. Over the next severa...
Joaquin Ruiz, Susan Wheeler