Sciweavers

5446 search results - page 926 / 1090
» Mobile computing
Sort
View
DBSEC
2003
149views Database» more  DBSEC 2003»
15 years 4 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
ISI
2006
Springer
15 years 3 months ago
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects
Abstract. With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. With such data, it becomes possible to...
Xiaolei Li, Jiawei Han, Sangkyum Kim
KAIS
2008
112views more  KAIS 2008»
15 years 3 months ago
A hybrid aggregation and compression technique for road network databases
Abstract Vector data and in particular road networks are being queried, hosted and processed in many application domains such as in mobile computing. Many client systems such as PD...
Ali Khoshgozaran, Ali Khodaei, Mehdi Sharifzadeh, ...
ASE
2005
145views more  ASE 2005»
15 years 3 months ago
Developing Ambient Intelligence Systems: A Solution based on Web Services
Enabling the ambient intelligence vision means that consumers will be provided with universal and immediate access to available content and services, together with ways of effectiv...
Valérie Issarny, Daniele Sacchetti, Ferda T...
JPDC
2007
191views more  JPDC 2007»
15 years 3 months ago
Clustering wireless ad hoc networks with weakly connected dominating set
The increasing popular personal communications and mobile computing require a wireless network infrastructure that supports selfconfiguration and self-management. Efficient clus...
Bo Han, Weijia Jia