Sciweavers

1505 search results - page 287 / 301
» On wireless network scheduling with intersession network cod...
Sort
View
EUROMICRO
1997
IEEE
15 years 3 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 3 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
WWW
2008
ACM
16 years 11 days ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
PERCOM
2006
ACM
15 years 11 months ago
A Programmable Service Architecture for Mobile Medical Care
This paper introduces MobiCare ? a novel service architecture that enables a wide range of health-related services for efficient and mobile patient care. These services include: (...
Rajiv Chakravorty
ISM
2005
IEEE
88views Multimedia» more  ISM 2005»
15 years 5 months ago
Hybrid Bitrate/PSNR Control for H.264 Video Streaming to Roaming Users
In wireless communications, the available throughput depends on several parameters, like physical layer, base station distance, fading and interference. Users experience changes i...
Fabio De Vito, Federico Ridolfo, Juan Carlos De Ma...