Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
Studies of mobile ad-hoc networks are often based on simulation and their underlying, necessarily simplified assumptions of physical reality. In order to analyse the practical pro...
Hartmut Ritter, Min Tian, Thiemo Voigt, Jochen H. ...
A significant number of new Java-based technologies for mobile code (aka agents) have recently emerged. The 'Aglets' system, from IBM's research labs, provides an e...
Mobile computers often benefit from software which adapts to their location. For example, a computer might be backed up when at the office, or the default printer might always be ...
In this article we describe and evaluate a novel, low interaction cost approach to supporting the spontaneous discovery of geo-tagged information while on the move. Our mobile hap...