Sciweavers

1631 search results - page 227 / 327
» Mobility Management
Sort
View
ACSAC
2000
IEEE
15 years 10 months ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
FAST
2003
15 years 6 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
DGO
2009
186views Education» more  DGO 2009»
15 years 6 months ago
Citizen noise pollution monitoring
In this paper we present a new approach to monitor noise pollution involving citizens and built upon the notions of participatory sensing and citizen science. We enable citizens t...
Nicolas Maisonneuve, Matthias Stevens, Maria E. Ni...
CORR
2010
Springer
113views Education» more  CORR 2010»
15 years 4 months ago
Simulated Annealing for Location Area Planning in Cellular networks
LA planning in cellular network is useful for minimizing location management cost in GSM network. In fact, size of LA can be optimized to create a balance between the LA update ra...
Nilesh B. Prajapati, Rupal R. Agravat, Mosin I. Ha...
IIR
2010
15 years 3 months ago
Social Approach to Context-Aware Retrieval
In this paper we present a general purpose solution to Web content perusal by means of mobile devices, named Social Context-Aware Browser. This is a novel approach for the informa...
Luca Vassena