Sciweavers

2580 search results - page 125 / 516
» Systems for human-powered mobile computing
Sort
View
134
Voted
ECOOPW
1998
Springer
15 years 7 months ago
Secure Recording of Itineraries through Co-operating Agents
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and o...
Volker Roth
101
Voted
GI
2004
Springer
15 years 9 months ago
Consistent Context Management in Mobile Ad Hoc Networks
: John entered his office. John left his office. The order of these updates to a context-aware system is important to reflect the state in the real world. Context information ob...
Jörg Hähner, Christian Becker, Pedro Jos...
127
Voted
ACSD
2003
IEEE
125views Hardware» more  ACSD 2003»
15 years 9 months ago
Modelling a Secure, Mobile, and Transactional System with CO-OPN
Modelling complex concurrent systems is often difficult and error-prone, in particular when new concepts coming from advanced practical applications are considered. These new appl...
Didier Buchs, Stanislav Chachkov, David Hurzeler
191
Voted
DAC
2006
ACM
16 years 4 months ago
SMERT: energy-efficient design of a multimedia messaging system for mobile devices
Customized multimedia content delivery has become one of the most desirable applications to mobile device users. However its intense usage of wireless and user interfaces poses a ...
Lin Zhong, Bin Wei, Michael J. Sinclair
148
Voted
IJNSEC
2008
129views more  IJNSEC 2008»
15 years 3 months ago
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...