Sciweavers

888 search results - page 103 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
ISPDC
2005
IEEE
15 years 5 months ago
A Component-based Software Infrastructure for Ubiquitous Computing
Multiplication of mobile devices and generalized use of wireless networks imply changes on the design and execution of distributed software applications targeting ubiquitous compu...
Areski Flissi, Christophe Gransart, Philippe Merle
DFMA
2005
IEEE
100views Multimedia» more  DFMA 2005»
15 years 5 months ago
Mobile Computing to Facilitate Interaction in Lectures and Meetings
The Campus Mobile project explored how PDAs and innovative interfaces can improve interaction during lectures and in small meetings. These mobile computers (small PCs or PDAs) are...
Isabelle M. Demeure, Claudie Faure, Eric Lecolinet...
FTDCS
2004
IEEE
15 years 3 months ago
Smart Phone: An Embedded System for Universal Interactions
In this paper, we present a system architecture that allows users to interact with embedded systems located in their proximity using Smart Phones. We have identified four models o...
Liviu Iftode, Cristian Borcea, Nishkam Ravi, Porli...
CODASPY
2011
14 years 3 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
IEEEARES
2006
IEEE
15 years 6 months ago
Mitigating Denial of Service Threats in GSM Networks
–Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of servic...
Valer Bocan, Vladimir Cretu