Sciweavers

10044 search results - page 1864 / 2009
» Authentication in Wireless Networks
Sort
View
MOBISYS
2009
ACM
16 years 5 months ago
mFerio: the design and evaluation of a peer-to-peer mobile payment system
In this paper, we present the design and evaluation of a nearfield communication-based mobile p2p payment application called mFerio which is designed to replace cash-based transac...
Rajesh Krishna Balan, Narayan Ramasubbu, Komsit Pr...
OSDI
2004
ACM
16 years 5 months ago
Energy-Efficiency and Storage Flexibility in the Blue File System
A fundamental vision driving pervasive computing research is access to personal and shared data anywhere at anytime. In many ways, this vision is close to being realized. Wireless...
Edmund B. Nightingale, Jason Flinn
PERCOM
2008
ACM
16 years 4 months ago
Structured decomposition of adaptive applications
We describe an approach to automate certain highlevel implementation decisions in a pervasive application, allowing them to be postponed until run time. Our system enables a model...
Justin Mazzola Paluska, Hubert Pham, Umar Saif, Gr...
PERCOM
2008
ACM
16 years 4 months ago
CoWSAMI: Interface-aware context gathering in ambient intelligence environments
In this paper we present CoWSAMI, a middleware infrastructure that enables context awareness in open ambient intelligence environments, consisting of mobile users and context sour...
Dionysis Athanasopoulos, Apostolos Zarras, Valéri...
PERCOM
2008
ACM
16 years 4 months ago
SGR: A Shared Generic Routing Support for Ad Hoc Ubiquitous Computing Environments
One of the most evident characteristics of an ad hoc ubiquitous computing environment is the dynamism of connections. Due to the mobility of nodes, paths between communicating pee...
Yangwoo Ko, Dongman Lee
« Prev « First page 1864 / 2009 Last » Next »