Software Security Vulnerabilities in Mobile Peer-to-peer Environment

I Botyan - 2012 - lutpub.lut.fi
Increase of computational power and emergence of new computer technologies led to
popularity of local communications between personal trusted devices. By-turn, it led to …

사용자를위한향상된콘텐츠및소셜네트워킹서비스제공을위한RCBAC 기반분류방법

조은애, 문창주, 박대하 - 디지털콘텐츠학회논문지, 2012 - dbpia.co.kr
최근 소셜 네트워크 사이트는 모바일 디바이스 기능과 보급의 향상과 맞물려 큰 인기를 끌고
있다. 이에 따라 사용자의 소셜 네트워크 사이트 가입도 많아지고 있고, 서비스 사용도 더욱 …

[PDF][PDF] Dynamic Group Generation based on Interests

EJM Ackerman - Citeseer
The Internet, a system developed to interconnect computers, has become readily accessible
to Smartphones. With the development of Web 2.0, more services and applications are able …

Program hosting in communications environment with Reactor and thread pool approach

K Kolehmainen - 2009 - lutpub.lut.fi
In this thesis concurrent communication event handling is implemented using thread pool
approach. Concurrent events are handled with a Reactor design pattern and multithreading …

Profiling of the Services and Applications in Mobile Peer-to-Peer Environment

P Hiirsalmi, K Heikkinen, J Porras - 2008 International Wireless …, 2008 - ieeexplore.ieee.org
In this paper, an approach to service profiling and thus enabling effective service use is
presented. This approach is built on the characteristics of mobile peer-to-peer environment …

Decentralized Approach for Distributed Service Environments

Z Liu, Y Jin, H Tian - 2008 5th IEEE Consumer …, 2008 - ieeexplore.ieee.org
Universal service terminal (UST) has been proposed as a novel virtual distributed terminal
supporting pervasive applications. It provides proactive services via aggregating diverse …

An OptimizedWorkload for Failure Data Analysis of Mobile P2P over Bluetooth Ad-Hoc Networks

G Carrozza, M Cinque, F Cornevilli… - 26th IEEE International …, 2006 - ieeexplore.ieee.org
Mobile Peer-to-Peer (P2P) is a base paradigm for many new killer applications for mobile ad-
hoc networks and the Mobile Internet. Currently, it is not well understood whether this …

[引用][C] Empowering mobile devices through cyber foraging

MD Kristensen - Aarhus University (Ph. D. thesis), 2010