This paper presents an aspect-oriented approach to access control in mobile agent systems, where a multipoint security check mechanism visualizes the services of a host as individ...
This paper presents various procedures that can be used in order to numerically evaluate what the maximum Z−width that can be rendered by a mobile haptic interface will be given ...
Federico Barbagli, Alessandro Formaglio, M. Franzi...
Security mechanisms such as firewalls commonly deployed throughout the Internet present serious obstacles to basic usage of Mobile IP. In this paper we describe how IP security me...
Reinhard Ruppelt, Andrei Pelinescu, Cristian Const...
Within a database mobile environment, cached data on mobile clients can take the form of materialized views. In order to e ciently maintain such materialized views while taking in...
Mobile active computational entities introduce peculiar problems in the coordination of distributed application components. The paper surveys several coordination models for mobil...