Sciweavers

2580 search results - page 116 / 516
» Systems for human-powered mobile computing
Sort
View
IJNSEC
2006
85views more  IJNSEC 2006»
14 years 10 months ago
A Forgery Attack on A Low Computation Cost User Authentication Scheme
In 2005, Lee-Lin-Chang proposed a low computation cost user authentication scheme for mobile communication. However, the current paper demonstrates the vulnerability of Lee-Lin-Ch...
Eun-Jun Yoon, Kee-Young Yoo
WONS
2005
IEEE
15 years 3 months ago
Fast Handoff process in Micro Mobile MPLS protocol for Micro-Mobility Management in Next Generation Networks
The rapid growth of wireless networks and services, integrated with the next-generation mobile communication systems, has led to designing efficient handoff protocols to handle m...
Rami Langar, Gwendal Le Grand, Samir Tohmé
AINA
2009
IEEE
15 years 5 months ago
SOA Initiatives for eLearning: A Moodle Case
— Mobile learning applications introduce a new degree of ubiquitousness in the learning process. There is a new generation of ICT-powered mobile learning experiences that exist i...
María José Casany Guerrero, Marc Ali...
95
Voted
NBIS
2007
Springer
15 years 4 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
82
Voted
ACMDIS
2006
ACM
15 years 4 months ago
Supporting ethnographic studies of ubiquitous computing in the wild
Ethnography has become a staple feature of IT research over the last twenty years, shaping our understanding of the social character of computing systems and informing their desig...
Andy Crabtree, Steve Benford, Chris Greenhalgh, Pa...