Sciweavers

5446 search results - page 298 / 1090
» Mobile computing
Sort
View
EUROPKI
2004
Springer
15 years 9 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
CCCG
2003
15 years 5 months ago
The Gaussian Centre of a Set of Mobile Points
Abstract Steph Durocher∗ and David Kirkpatrick† Department of Computer Science, University of British Columbia Vancouver BC, Canada Given a set of client positions as input, f...
Stephane Durocher, David G. Kirkpatrick
MIS
2007
Springer
159views Multimedia» more  MIS 2007»
15 years 3 months ago
The application of fluid mobility modelling in wireless cellular networks
Mobility models, synthetic or trace, try to accurately model the movement of a single user or a group of users. Models are used in simulators and emulators to investigate the cons...
Ronan J. Skehill, Sean McGrath
IPPS
2006
IEEE
15 years 9 months ago
A design environment for mobile applications
In this paper we show how high-level UML models of mobile computing applications can be analysed for classical performance measures such as throughput. The approach proceeds by co...
Stephen Gilmore, Valentin Haenel, Jane Hillston, J...
MHCI
2005
Springer
15 years 9 months ago
Navigation control for mobile virtual environments
In this paper, we describe a project which uses PDAs to provide an interactive experience with a virtual environment. In particular, we focus on the navigational aspects of allowi...
Gary Marsden, Nicholas Tip