Sciweavers

2418 search results - page 22 / 484
» Requirements for mobile photoware
Sort
View
ESORICS
2008
Springer
14 years 11 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
AAAI
2010
14 years 11 months ago
A Bayesian Nonparametric Approach to Modeling Mobility Patterns
Constructing models of mobile agents can be difficult without domain-specific knowledge. Parametric models flexible enough to capture all mobility patterns that an expert believes...
Joshua Mason Joseph, Finale Doshi-Velez, Nicholas ...
I3E
2009
134views Business» more  I3E 2009»
14 years 7 months ago
Realizing Mobile Web Services for Dynamic Applications
Use of web services also on mobile devices becomes increasingly relevant. However, realizing such mobile web services based on the standard protocol stack is often inappropriate f...
Sonja Zaplata, Viktor Dreiling, Winfried Lamersdor...
47
Voted
JDCTA
2008
87views more  JDCTA 2008»
14 years 9 months ago
M-Brochure
Tourism industry is one of the important sources of income in many countries. The appropriate and quick submission of primary information such as address of hotels to the tourists...
Mohammad Shirali-Shahreza
RE
2002
Springer
14 years 9 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...