Sciweavers

1880 search results - page 47 / 376
» Mobile Application Profiling for Connected Mobile Devices
Sort
View
SPW
1997
Springer
15 years 4 months ago
Protocols Using Anonymous Connections: Mobile Applications
This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols ryption as primitive. This abstraction allows us t...
Michael G. Reed, Paul F. Syverson, David M. Goldsc...
PERVASIVE
2005
Springer
15 years 5 months ago
A Mobile Device as User Interface for Wearable Applications
In this paper, we describe the Tampere University of Technology’s involvement in the research of machine washable and wirelessly rechargeable wearable technology and using mobil...
Pekka Iso-Ketola, Tapio Karinsalo, Manu Myry, Lass...
UIST
2004
ACM
15 years 5 months ago
A gesture-based authentication scheme for untrusted public terminals
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This...
Shwetak N. Patel, Jeffrey S. Pierce, Gregory D. Ab...
PERCOM
2003
ACM
15 years 11 months ago
ReCalendar: Calendaring and Scheduling Applications with CPU and Energy Resource Guarantees for Mobile Devices
In this paper, we present an advance reservation scheme for CPU and energy resources, called ReCalendar. The goal is to enable soft real-time applications on mobile devices to ach...
Wanghong Yuan, Klara Nahrstedt
WWW
2007
ACM
16 years 15 days ago
Mobile shopping assistant: integration of mobile applications and web services
The goal of this poster is to describe our implementation of a new architecture enabling efficient integration between mobile phone applications and Web Services. Using this archi...
Huaigu Wu, Yuri Natchetoi