Sciweavers

722 search results - page 97 / 145
» Offering Mobile Security as a Service
Sort
View
ICSEA
2006
IEEE
15 years 3 months ago
A Conceptual Framework for Business Process Engineering: A Case Study
— this paper discusses a conceptual framework for the requirements engineering process for e-school applications offering a service to the information society. The e-school appli...
Zeljka Car, Hrvoje Belani, Antun Caric
EUROPKI
2004
Springer
15 years 3 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
PERCOM
2010
ACM
15 years 1 months ago
Pervasive maps: Explore and interact with pervasive environments
—Efficient discovery of nearby devices and services is one of the preconditions to obtain a usable pervasive environment. Typical user interfaces in these environments hide the ...
Geert Vanderhulst, Kris Luyten, Karin Coninx
CAISE
2008
Springer
14 years 11 months ago
Modelling, Simulation, and Performance Analysis of Business Processes Involving Ubiquitous Systems
A recent trend in Ubiquitous Computing is that embedded software (e.g. in production machines, wired or wireless networked sensors and actuators, or RFID readers) directly offers W...
Patrik Spieß, Dinh Khoa Nguyen, Ingo Weber, ...
ESM
1998
14 years 11 months ago
Developing Interest Management Techniques in Distributed Interactive Simulation Using Java
Bandwidth consumption in distributed real-time simulation, or networked real-time simulation, is a major problem as the number of participants and the sophistication of joint simu...
Jon Saville, Simon J. E. Taylor