Sciweavers

1394 search results - page 203 / 279
» Network Management of Predictive Mobile Networks
Sort
View
ICSNC
2007
IEEE
15 years 11 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
ACSAC
2005
IEEE
15 years 10 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
ICRA
2003
IEEE
166views Robotics» more  ICRA 2003»
15 years 10 months ago
A service-based network architecture for wearable robots
We are developing a network architecture for our novel robot concept of wearable robot. Wearable robots are mobile information devices capable of supporting remote communication a...
Ka Keung Lee, Ping Zhang, Yangsheng Xu
PERCOM
2008
ACM
16 years 4 months ago
MyNet: A Platform for Secure P2P Personal and Social Networking Services
Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on t...
Dimitris N. Kalofonos, Zoe Antoniou, Franklin Reyn...
WAIM
2007
Springer
15 years 10 months ago
An Adaptive Dynamic Cluster-Based Protocol for Target Tracking in Wireless Sensor Networks
The rapid progress of wireless communication and embedded micro sensing technologies has made wireless sensor networks possible. Target tracking is an important application of wire...
WenCheng Yang, Zhen Fu, Jung-Hwan Kim, Myong-Soon ...