Sciweavers

10044 search results - page 1874 / 2009
» Authentication in Wireless Networks
Sort
View
PERCOM
2004
ACM
16 years 4 months ago
Patch Panel: Enabling Control-Flow Interoperability in Ubicomp Environments
Ubiquitous computing environments accrete slowly over time rather than springing into existence all at once. Mechanisms are needed for incremental integration-the problem of how t...
Rafael Ballagas, Andy Szybalski, Armando Fox
PERCOM
2004
ACM
16 years 4 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
PERCOM
2004
ACM
16 years 4 months ago
Expanding Education through Active Space Collaboration
In this paper we introduce a system called e-Fuzion based on using computing devices, such as Tablet PCs, that empower students and teachers with better technologies for education...
Chad Peiper, Ellick Chan, Roy H. Campbell, Jim Bre...
PERCOM
2003
ACM
16 years 4 months ago
PILGRIM: A Location Broker and Mobility-Aware Recommendation System
Mobile computing adds a mostly unexplored dimension to data mining: user's position is a relevant piece of information, and recommendation systems, selecting and ranking link...
Mauro Brunato, Roberto Battiti
PERCOM
2003
ACM
16 years 4 months ago
A High Performance Privacy-Oriented Location System
Many mobile applications can be greatly enhanced when provided with the locations of people and devices. Ultrasonic location systems have been shown to supply location information...
Mike Hazas, Andy Ward
« Prev « First page 1874 / 2009 Last » Next »