Sciweavers

160 search results - page 15 / 32
» Secure Information Flow in Mobile Bootstrapping Process
Sort
View
CCS
2008
ACM
15 years 1 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...
BCSHCI
2008
15 years 1 months ago
Distributed cognition and mobile healthcare work
In this paper, we look at the application of the DiCoT methodology [4] to the analysis of a mobile healthcare setting. While the methodology includes a set of principles and theme...
Joseph McKnight, Gavin Doherty
CAISE
2003
Springer
15 years 3 months ago
A Specification Approach to Compose Mobile Web Services Using Service Chart Diagrams
We present our work on composing mobile Web services, denoted by M-services, in the wireless world. The wireless world has its own features that make it completely different from t...
Zakaria Maamar, Mohammed Lahkim
AAAI
2007
15 years 2 months ago
Hybrid Inference for Sensor Network Localization Using a Mobile Robot
In this paper, we consider a hybrid solution to the sensor network position inference problem, which combines a real-time filtering system with information from a more expensive,...
Dimitri Marinakis, David Meger, Ioannis M. Rekleit...
SACMAT
2004
ACM
15 years 5 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka