Sciweavers

884 search results - page 133 / 177
» ACM Springer Mobile Networks and Applications (MONET)
Sort
View
DIM
2005
ACM
15 years 2 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
111
Voted
MHCI
2009
Springer
15 years 7 months ago
Exploring the use of landmarks for mobile navigation support in natural environments
Landmarks are a key element in navigation and have been used extensively to provide navigation support to pedestrians through mobile devices in urban areas. Natural environments d...
Caroline Snowdon, Christian Kray
125
Voted
IWCMC
2006
ACM
15 years 6 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
105
Voted
MOBICOM
2012
ACM
13 years 3 months ago
RadioJockey: mining program execution to optimize cellular radio usage
Many networked applications that run in the background on a mobile device incur significant energy drains when using the cellular radio interface for communication. This is mainl...
Pavan K. Athivarapu, Ranjita Bhagwan, Saikat Guha,...
PERCOM
2010
ACM
15 years 4 months ago
Adaptive deployment for pervasive data gathering in connectivity-challenged environments
—Some current and future pervasive data driven applications must operate in ”extreme” environments where endto-end connectivity cannot be guaranteed at all times. In fact, it...
Tahiry Razafindralambo, Nathalie Mitton, Aline Car...