Sciweavers

1064 search results - page 62 / 213
» The Case for Mobile OLAP
Sort
View
SACRYPT
2004
Springer
15 years 7 months ago
On Proactive Secret Sharing Schemes
Abstract. This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restri...
Ventzislav Nikov, Svetla Nikova
ACMSE
2005
ACM
15 years 3 months ago
Generative approaches for application tailoring of mobile devices
The popularity of mobile devices has propelled the development of many useful location-aware applications. However, the heterogeneity of mobile devices necessitates that the softw...
Victoria Davis, Jeff Gray, Joel Jones
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
15 years 8 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
PERCOM
2009
ACM
15 years 8 months ago
QoS Enabled Mobility Support for Mesh Networks
Abstract—Existing solutions for building wireless mesh networks suffer from reduced efficiency. This is due to lack of reliable self-configuration procedures that can dynamical...
Dario Gallucci, Silvia Giordano
HUC
2009
Springer
15 years 6 months ago
Controlling Error Propagation in Mobile-Infrastructure Based Localization
Mobile infrastructure consists of one or more sensors in a fixed configuration on a mobile platform. By moving the mobile platform in the environment and attaching a set of stat...
Ying Zhang, Juan Liu