Sciweavers

850 search results - page 141 / 170
» Performance assertions for mobile devices
Sort
View
ACSAC
2006
IEEE
15 years 11 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
EURONGI
2008
Springer
15 years 7 months ago
A Seamless Vertical Handover Approach
Abstract-- Wireless network devices are equipped with multiple access technologies like UMTS and Wireless LAN. The handover between the technologies has been widely studied in lite...
Rastin Pries, Dirk Staehle, Phuoc Tran-Gia, Thorst...
INTEGRATION
2007
98views more  INTEGRATION 2007»
15 years 5 months ago
Hashchip: A shared-resource multi-hash function processor architecture on FPGA
The ubiquitous presence of mobile devices and the demand for better performance and efficiency have motivated research into embedded implementations of cryptography algorithms. I...
T. S. Ganesh, Michael T. Frederick, T. S. B. Sudar...
MOBISYS
2011
ACM
14 years 8 months ago
Indoor location sensing using geo-magnetism
We present an indoor positioning system that measures location using disturbances of the Earth's magnetic field caused by structural steel elements in a building. The presenc...
Jaewoo Chung, Matt Donahoe, Chris Schmandt, Ig-Jae...
CHI
2006
ACM
16 years 5 months ago
Direct pointer: direct manipulation for large-display interaction using handheld cameras
This paper describes the design and evaluation of a technique, Direct Pointer, that enables users to interact intuitively with large displays using cameras equipped on handheld de...
Hao Jiang, Eyal Ofek, Neema Moraveji, Yuanchun Shi