Sciweavers

10044 search results - page 1858 / 2009
» Authentication in Wireless Networks
Sort
View
MOBICOM
2012
ACM
13 years 7 months ago
RadioJockey: mining program execution to optimize cellular radio usage
Many networked applications that run in the background on a mobile device incur significant energy drains when using the cellular radio interface for communication. This is mainl...
Pavan K. Athivarapu, Ranjita Bhagwan, Saikat Guha,...
PERCOM
2003
ACM
16 years 4 months ago
Location Aware Resource Management in Smart Homes
Abstract-- The rapid advances in a wide range of wireless access technologies along with the efficient use of smart spaces have already set the stage for development of smart homes...
Abhishek Roy, Soumya K. Das Bhaumik, Amiya Bhattac...
MOBISYS
2005
ACM
16 years 4 months ago
Energy efficiency of handheld computer interfaces: limits, characterization and practice
Energy efficiency has become a critical issue for battery-driven computers. Significant work has been devoted to improving it through better software and hardware. However, the hu...
Lin Zhong, Niraj K. Jha
MOBISYS
2004
ACM
16 years 4 months ago
Metadata Creation System for Mobile Images
The amount of personal digital media is increasing, and managing it has become a pressing problem. Effective management of media content is not possible without content-related me...
Risto Sarvas, Erick Herrarte, Anita Wilhelm, Marc ...
MOBISYS
2003
ACM
16 years 4 months ago
Energy Aware Lossless Data Compression
Wireless transmission of a bit can require over 1000 times more energy than a single 32-bit computation. It would therefore seem desirable to perform significant computation to re...
Kenneth C. Barr, Krste Asanovic
« Prev « First page 1858 / 2009 Last » Next »