SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise
of mobile commerce it has become an integral tool for conducting business. However, SMS …
of mobile commerce it has become an integral tool for conducting business. However, SMS …
A service-based mobile tourist advisor
A Echtibi, MJ Zemerly, J Berri - International Journal of Computer …, 2009 - cspub-ijcisim.org
This paper presents a service based mobile application that assists tourists traveling to a
country. The application provides tourists with context-aware information adapted to their …
country. The application provides tourists with context-aware information adapted to their …
Murshid: a mobile tourist companion
A Echtibi, MJ Zemerly, J Berri - … of the 1st international Workshop on …, 2009 - dl.acm.org
This paper describes Murshid, a context aware mobile application that provides guidance to
tourists traveling to a country. The user context is a key element of our application as …
tourists traveling to a country. The user context is a key element of our application as …
[PDF][PDF] Short Messaging System (SMS) Compression On Mobile Phone–SMS Zipper
A Mohd, TM Wong - Jurnal Teknologi, 2008 - journals.utm.my
In this paper we present a development of a new algorithm to develop a mobile application
software that can compress and decompress multiple pages short message service (SMS) …
software that can compress and decompress multiple pages short message service (SMS) …
[PDF][PDF] Design and implementation of the GNEX C-to-WIPI Java converter for automatic mobile contents translation
YS Lee, HB Ham - Journal of Korea Multimedia Society, 2010 - koreascience.kr
Since Korean mobile communication companies each use different mobile platforms,
developers must configure and translate their game contents to run under each of the …
developers must configure and translate their game contents to run under each of the …
Investigating correlation-based fingerprint authentication schemes for mobile devices using the J2ME technology
Y Wang, J Hu, K Xi… - 2007 IEEE Workshop on …, 2007 - ieeexplore.ieee.org
This paper investigates correlation-based fingerprint authentication schemes that can be
used for mobile devices. The investigated algorithms were implemented with a J2ME …
used for mobile devices. The investigated algorithms were implemented with a J2ME …
[PDF][PDF] Developing a Mobile Application via Bluetooth Wireless Technology for Enhancing Student-Instructor Communication.
S Idwan - International Journal of Interactive Mobile …, 2009 - Citeseer
A Bluetooth mobile application is developed to enhance student-instructor interaction during
delivery of university courses. The paper presents Mobile application via Bluetooth wireless …
delivery of university courses. The paper presents Mobile application via Bluetooth wireless …
The interactive lecture: a new teaching paradigm based on pervasive computing
N Scheele - None, 2005 - madoc.bib.uni-mannheim.de
Lectures, though often criticised for their monolithic instruction style and-associated with that-
the lack of motivation on the side of the students leading to a very low learning success, are …
the lack of motivation on the side of the students leading to a very low learning success, are …
Research on the virtual 3D Human-computer Interaction based on the 3G terminal cross-platform
P Wang, L Yi, C Lu - … on Computer-Aided Industrial Design & …, 2009 - ieeexplore.ieee.org
The three-dimensional (3D) human-computer interaction of the wireless mobile
communication is becoming the research highlight in the field of the human-computer …
communication is becoming the research highlight in the field of the human-computer …
[图书][B] A framework for cryptography algorithms on mobile devices
JLC Lo - 2007 - search.proquest.com
Mobile communication devices have become a popular tool for gathering and disseminating
information and data. With the evidence of the growth of wireless technology and a need for …
information and data. With the evidence of the growth of wireless technology and a need for …