Sciweavers

1045 search results - page 180 / 209
» Remote Evaluation of Mobile Applications
Sort
View
EDOC
2004
IEEE
15 years 5 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 9 months ago
Swift: a register-based JIT compiler for embedded JVMs
Code quality and compilation speed are two challenges to JIT compilers, while selective compilation is commonly used to tradeoff these two issues. Meanwhile, with more and more Ja...
Yuan Zhang, Min Yang, Bo Zhou, Zhemin Yang, Weihua...
WWW
2003
ACM
16 years 2 months ago
High-performance spatial indexing for location-based services
Much attention has been accorded to Location-Based Services and location tracking, a necessary component in active, trigger-based LBS applications. Tracking the location of a larg...
Jussi Myllymaki, James H. Kaufman
INFOCOM
2008
IEEE
15 years 8 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...
WMTE
2008
IEEE
15 years 8 months ago
Context-Aware Writing in Ubiquitous Learning Environments
With the popularization of the wireless network, and the progress of mobile computing technology, the efficiency of the hand-held device is better, and its applications are wider....
Tzung-Shi Chen, Cheng-Sian Chang, Jeng-Shian Lin, ...