Sciweavers

2580 search results - page 417 / 516
» Systems for human-powered mobile computing
Sort
View
ICDE
2005
IEEE
126views Database» more  ICDE 2005»
16 years 5 months ago
A Probabilistic XML Approach to Data Integration
In mobile and ambient environments, devices need to become autonomous, managing and resolving problems without interference from a user. The database of a (mobile) device can be s...
Maurice van Keulen, Ander de Keijzer, Wouter Alink
WWW
2003
ACM
16 years 4 months ago
Dynamic service reconfiguration for wireless web access
This paper describes a dynamic service reconfiguration model where the proxy is composed of a chain of service objects called mobilets (pronounced as mo-be-lets), which can be dep...
Siu Nam Chuang, Alvin T. S. Chan, Jiannong Cao, Ro...
WMCSA
2009
IEEE
15 years 10 months ago
LiveCompare: grocery bargain hunting through participatory sensing
Many consumers are misled into paying high prices due to the search costs associated with attaining price information [16]. The popularity of bargain-hunting web sites like Slickd...
Linda Deng, Landon P. Cox
NBIS
2009
Springer
15 years 10 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 10 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen