Sciweavers

PERCOM
2008
ACM
14 years 4 months ago
Load Sharing and Bandwidth Control in Mobile P2P Wireless Sensor Networks
In this paper, we investigate the problem of resource constraints in Mobile Peer-to-Peer Wireless Sensor Networks (MP2P WSNs). We propose a scheme to load share tasks among peer s...
Elisa Rondini, Stephen Hailes, Li Li
PERCOM
2008
ACM
14 years 4 months ago
High-level Programming Support for Robust Pervasive Computing Applications
In this paper, we present a domain-specific Interface Definition Language (IDL) and its compiler, dedicated to the development of pervasive computing applications. Our IDL provide...
Wilfried Jouve, Julien Lancia, Nicolas Palix, Char...
PERCOM
2008
ACM
14 years 4 months ago
On-demand Video Streaming in Mobile Opportunistic Networks
Providing on-demand video streaming services to large numbers of nodes in mobile wireless networks is a challenging task. We propose MOVi (Mobile Opportunistic Video-on-demand), a...
Hayoung Yoon, JongWon Kim, Feiselia Tan, Robert Hs...
PERCOM
2008
ACM
14 years 4 months ago
Environment-Awareness: Quantitative Processing of Context Changes
Comparing context of different entities is not easy at all. Since context depends on the situation of a particular entity it can be understood in different ways by various entitie...
Andreas Heil, Martin Gaedke
PERCOM
2008
ACM
14 years 4 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...
PERCOM
2008
ACM
14 years 4 months ago
A Survey of Current Directions in Service Placement in Mobile Ad-hoc Networks
Service placement deals with the problem of selecting which node in a network is most suitable for hosting a service that responds to queries from other nodes. Optimally placing s...
Georg Wittenburg, Jochen H. Schiller
PERCOM
2008
ACM
14 years 4 months ago
Catch Me (If You Can): Data Survival in Unattended Sensor Networks
Roberto Di Pietro, Luigi V. Mancini, Claudio Sorie...
PERCOM
2008
ACM
14 years 4 months ago
IP Address Passing for VANETs
In Vehicular Ad-hoc Networks (VANETs), vehicles can gain short connections to the Internet by using wireless access points (AP). A significant part of the connection time is the t...
Todd Arnold, Wyatt Lloyd, Jing Zhao, Guohong Cao
PERCOM
2008
ACM
14 years 4 months ago
SGR: A Shared Generic Routing Support for Ad Hoc Ubiquitous Computing Environments
One of the most evident characteristics of an ad hoc ubiquitous computing environment is the dynamism of connections. Due to the mobility of nodes, paths between communicating pee...
Yangwoo Ko, Dongman Lee
PERCOM
2008
ACM
14 years 4 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar