Sciweavers

2580 search results - page 63 / 516
» Systems for human-powered mobile computing
Sort
View
IJNSEC
2010
324views more  IJNSEC 2010»
14 years 4 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi
MOBILITY
2009
ACM
15 years 4 months ago
Detection of images with adult content for parental control on mobile devices?
In this paper we present a prototype for parental control that detects images with adult content received on a mobile device. More specifically, the application that we developed...
Giuseppe Amato, Paolo Bolettieri, Gabriele Costa, ...
MOBISYS
2010
ACM
15 years 7 days ago
Catnap: exploiting high bandwidth wireless interfaces to save energy for mobile devices
Energy management is a critical issue for mobile devices, with network activity often consuming a significant portion of the total system energy. In this paper, we propose Catnap,...
Fahad R. Dogar, Peter Steenkiste, Konstantina Papa...
ICDCSW
2008
IEEE
15 years 4 months ago
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems
Zhong Xu, Xue Liu, Guoqing Zhang, Wenbo He, Guanzh...