Sciweavers

188 search results - page 12 / 38
» Virtualized in-cloud security services for mobile devices
Sort
View
ESORICS
2008
Springer
14 years 11 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
ACSW
2003
14 years 10 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton
MDM
2010
Springer
151views Communications» more  MDM 2010»
14 years 7 months ago
diffeRS: A Mobile Recommender Service
—Thanks to advances in mobile technology, modern mobile devices have become essential companions, assisting their users in attaining their daily tasks. It will not be long before...
Lucia Del Prete, Licia Capra
IASTEDSE
2004
14 years 10 months ago
Mobile, on demand access of service-annotated 3D maps
The ever-increasing capabilities (processing power, memory, connectivity, display, etc.) of personal devices such as PDAs and mobile phones, as well as their convergence, have ena...
Michael Przybilski, Stefano Campadello, Titos Sari...
COMCOM
2000
148views more  COMCOM 2000»
14 years 9 months ago
Advanced service provisioning based on mobile agents
Service provisioning is currently a challenging issue to offer future telecommunication services efficiently and at the same time in a flexible and user friendly manner. As a cont...
Peyman Farjami, Carmelita Görg, Frank Bell