Sciweavers

10044 search results - page 1963 / 2009
» Authentication in Wireless Networks
Sort
View
92
Voted
PERCOM
2007
ACM
15 years 10 months ago
Achieving Flexible Cache Consistency for Pervasive Internet Access
Caching is an important technique to support pervasive Internet access. Cache consistency measures the deviation between the cached data and the source data. In mobile computing e...
Yu Huang 0002, Jiannong Cao, Zhijun Wang, Beihong ...
100
Voted
PERCOM
2006
ACM
15 years 10 months ago
Localized Sensor Area Coverage with Low Communication Overhead
We propose several localized sensor area coverage protocols, for arbitrary ratio of sensing and transmission radii. Sensors are assumed to be time synchronized, and active sensors...
Antoine Gallais, Jean Carle, David Simplot-Ryl, Iv...
MOBISYS
2008
ACM
15 years 10 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
MOBISYS
2006
ACM
15 years 10 months ago
Context-aware interactive content adaptation
Automatic adaptation of content for mobile devices is a challenging problem because optimal adaptation often depends on the usage semantics of content, as well as the context of u...
Iqbal Mohomed, Jim Chengming Cai, Sina Chavoshi, E...
MOBISYS
2004
ACM
15 years 10 months ago
Mimic: Raw Activity Shipping for File Synchronization in Mobile File Systems
In this paper, we consider the problem of file synchronization when a mobile host shares files with a backbone file server in a network file system. Several diff schemes have been...
Tae-Young Chang, Aravind Velayutham, Raghupathy Si...
« Prev « First page 1963 / 2009 Last » Next »