Sciweavers

267 search results - page 20 / 54
» Wireless Handheld Devices Become Trusted Network Devices
Sort
View
WMTE
2002
IEEE
15 years 6 months ago
Environmental Detectives: PDAs as a Window into a Virtual Simulated World
The use of computer simulations is changing the nature of scientific investigation and providing us unique insights into the way that the world works. As simulation moves from the...
Eric Klopfer, Kurt Squire, Henry Jenkins
GI
2004
Springer
15 years 7 months ago
Policy-Based Context-Management for Mobile Solutions
: Nowadays our world becomes more and more connected, and sensors and any kind of mobile (e.g. cell phones, PDAs) and fixed computational devices are linked together through wired...
Caroline Funk, Björn Schiemann
TRIDENTCOM
2010
IEEE
14 years 11 months ago
ASSERT: A Wireless Networking Testbed
Abstract. As wireless networks become a critical part of home, business and industrial infrastructure, researchers will meet these demands by providing new networking technologies....
Ehsan Nourbakhsh, Jeff Dix, Paul Johnson, T. Ryan ...
134
Voted
PERCOM
2005
ACM
16 years 1 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 5 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...