Sciweavers

1259 search results - page 178 / 252
» Analysis of Movement and Mobility of Wireless Network Users
Sort
View
MOBICOM
1996
ACM
15 years 5 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
ISCC
2008
IEEE
135views Communications» more  ISCC 2008»
15 years 7 months ago
Analysis of compressed depth and image streaming on unreliable networks
This paper explores the issues connected to the transmission of three dimensional scenes over unreliable networks such as the wireless ones. It analyzes the effect of the loss of ...
Pietro Zanuttigh, Andrea Zanella, Guido M. Cortela...
SCANGIS
2003
15 years 2 months ago
Mobile E-Commerce and Location-Based Services: Technology and Requirements
Advances in Internet and network technology and the rapidly growing number of mobile personal devices result in the fast growth of Mobile E-Commerce, M-Commerce. In this paper we v...
Aphrodite Tsalgatidou, Jari Veijalainen, Jouni Mar...
ICDE
2008
IEEE
142views Database» more  ICDE 2008»
16 years 2 months ago
A Motion-Aware Approach to Continuous Retrieval of 3D Objects
Abstract-- With recent advances in mobile computing technologies, mobile devices can now render 3D objects realistically. Many users of these devices such as tourists, mixed-realit...
Mohammed Eunus Ali, Rui Zhang, Egemen Tanin, Lars ...
MOBICOM
2010
ACM
15 years 1 months ago
ZiFi: wireless LAN discovery via ZigBee interference signatures
WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing WiFi infrastructure only provides intermittent connectiv...
Ruogu Zhou, Yongping Xiong, Guoliang Xing, Limin S...