Sciweavers

644 search results - page 105 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
MM
2006
ACM
127views Multimedia» more  MM 2006»
15 years 5 months ago
Automatic scaling and cropping of videos for devices with limited screen resolution
A large number of previously recorded videos cannot be directly visualized on mobile devices like PDAs or mobile phones due to an inappropriate screen resolution of their displays...
Stephan Kopf, Fleming Lampi, Thomas King, Wolfgang...
IPPS
2006
IEEE
15 years 5 months ago
k-anycast routing schemes for mobile ad hoc networks
— Anycast is a communication paradigm that was first introduced to the suit of routing protocols in IPv6 networks. In anycast, a packet is intended to be delivered to one of the...
Bing Wu, Jie Wu
CHI
2006
ACM
16 years 5 days ago
Interweaving mobile games with everyday life
We introduce a location?based game called Feeding Yoshi that provides an example of seamful design, in which key characteristics of its underlying technologies--the coverage and s...
Marek Bell, Matthew Chalmers, Louise Barkhuus, Mal...
IWCMC
2006
ACM
15 years 5 months ago
Proposal for a cross-layer coordination framework for next generation wireless systems
Cross-Layer design has been the focus of several recent research efforts. Due to the highly variable nature of the links used in wireless communication systems and the resource-po...
Karim M. El Defrawy, Magda El Zarki, Mohamed M. Kh...
ICDCSW
2009
IEEE
15 years 6 months ago
EDLA Tradeoffs for Wireless Sensor Network Target Tracking
—The number of active nodes in a WSN deployment governs both the longevity of the network and the accuracy of applications using the network’s data. As node hibernation techniq...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...