Sciweavers

3016 search results - page 602 / 604
» Disappearing mobile devices
Sort
View
VTC
2010
IEEE
207views Communications» more  VTC 2010»
13 years 4 months ago
The Design and Implementation of IEEE 802.21 and Its Application on Wireless VoIP
—Supporting a multimode mobile device to seamlessly switch its connections between various wireless access networks, such as WiMAX, Wi-Fi, and LTE, is an important research issue...
Tein-Yaw Chung, Yung-Mu Chen, Pu-Chen Mao, Chen-Ku...
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 3 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
ICIP
2010
IEEE
13 years 3 months ago
Motion-blur-free exposure fusion
We present a novel approach to HDR (high-dynamic-range) image fusion that copes with image blur degradation often present in longexposed images. The proposed approach can deal wit...
Marius Tico, Natasha Gelfand, Kari Pulli
IMC
2010
ACM
13 years 3 months ago
Characterizing radio resource allocation for 3G networks
3G cellular data networks have recently witnessed explosive growth. In this work, we focus on UMTS, one of the most popular 3G mobile communication technologies. Our work is the f...
Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoq...
WISEC
2010
ACM
13 years 3 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed