Sciweavers

2347 search results - page 1 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
CHI
2007
ACM
14 years 5 months ago
Location, location, location: a study of bluejacking practices
We present an initial exploration of bluejacking, the practice of using Bluetooth-enabled mobile phones to send unsolicited messages to other Bluetooth-enabled mobile phones withi...
Jennifer Thom-Santelli, Alex Ainslie, Geri Gay
AGILEDC
2004
IEEE
13 years 8 months ago
A Study Case: Evolution of Co-Location and Planning Strategy
Agile practices can and should be evolved throughout a project. This paper focuses on the evolution of two agile practices, namely co-location and planning strategy, in a software...
Amy Law, Allen Ho
HUC
2010
Springer
13 years 5 months ago
Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing
The popularity of micro-blogging has made generalpurpose information sharing a pervasive phenomenon. This trend is now impacting location sharing applications (LSAs) such that use...
Karen P. Tang, Jialiu Lin, Jason I. Hong, Daniel P...
ICDE
2011
IEEE
288views Database» more  ICDE 2011»
12 years 8 months ago
Optimal location queries in road network databases
— Optimal location (OL) queries are a type of spatial queries particularly useful for the strategic planning of resources. Given a set of existing facilities and a set of clients...
Xiaokui Xiao, Bin Yao 0002, Feifei Li
INFOCOM
2012
IEEE
11 years 7 months ago
Locating malicious nodes for data aggregation in wireless networks
—Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable ...
XiaoHua Xu, Qian Wang, Jiannong Cao, Peng-Jun Wan,...