Handheld Mobile Devices for Remote Monitoring of Factory

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Strong Security for Mobile Handheld Devices

We present a method for constructing signature schemes for use with mobile handheld devices that mitigates the risk of an attacker forging signatures using key material garnered from a lost handheld. This scheme is forward-secure, meaning that signatures created before a breach are still valid, and server-assisted, meaning that a separate untrusted server must assist the device in signing, ther...

متن کامل

Interface Design for Handheld Mobile Devices

Mobile computing has attracted a lot of attention from both the industry and academia in recent years. While a number of mobile applications have been developed, there are no established guidelines on the design of mobile device interfaces. This paper presents our initial efforts to provide a set of practical design guidelines for mobile device interfaces.

متن کامل

Audio for Mobile and Handheld Devices

T he AES 29th Conference, Audio for Mobile and Handheld Devices, was held at the conference center (see photo inset) on the beautiful campus of Seoul National University located in the thriving metropolis (background photo) of Seoul, Korea on September 2–4 2006. The conference was a significant milestone for AES. It was the first AES conference held in Asia. It was also the first conference dev...

متن کامل

Secure Remote Health Monitoring with Unreliable Mobile Devices

As the nation's healthcare information infrastructure continues to evolve, new technologies promise to provide readily accessible health information that can help people address personal and community health concerns. In particular, wearable and implantable medical sensors and portable computing devices present many opportunities for providing timely health information to health providers, publ...

متن کامل

User Authentication Schemes for Mobile and Handheld Devices

User authentication is a difficulty for every system providing safe access to precious, private information, or personalized services. It is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs). User authentication is the primary line of defence for a handheld device that comes into the hands of an unauthorized individual. Password or Per...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of International Conference on Artificial Life and Robotics

سال: 2016

ISSN: 2188-7829

DOI: 10.5954/icarob.2016.os2-4