Sciweavers

2580 search results - page 78 / 516
» Systems for human-powered mobile computing
Sort
View
142
Voted
DSOM
2000
Springer
15 years 8 months ago
Evaluation of Constrained Mobility for Programmability in Network Management
In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobilit...
Christos Bohoris, Antonio Liotta, George Pavlou
104
Voted
WMCSA
2009
IEEE
15 years 10 months ago
Planning ahead: techniques for simplifying mobile service use
Interacting with mobile applications and services remains difficult for users because of the impact of mobility on both device capabilities and the cognitive resources of users. I...
Michael Harding, Oliver Storz, Nigel Davies, Adria...
160
Voted
ICPADS
1997
IEEE
15 years 7 months ago
An Approach for Mobile Agent Security and Fault Tolerance using Distributed Transactions
Mobile agents are no longer a theoretical issue since different architectures for their realization have been proposed. With the increasing market of electronic commerce it become...
Hartmut Vogler, Thomas Kunkelmann, Marie-Luise Mos...
138
Voted
ISSA
2004
15 years 5 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
121
Voted
PERCOM
2005
ACM
16 years 3 months ago
Communication Context for Adaptive Mobile Applications
This paper describes our ongoing work on a system that provides information about network resources and related communication facilities to applications running on a mobile device...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...