Sciweavers

5068 search results - page 801 / 1014
» Basic Computations in Wireless Networks
Sort
View
ECOOP
1999
Springer
15 years 9 months ago
Object-Oriented Programming on the Network
Object-oriented programming techniques have been used with great success for some time. But the techniques of object-oriented programming have been largely confined to the single a...
Jim Waldo
PERCOM
2009
ACM
16 years 5 months ago
High Accuracy Context Recovery using Clustering Mechanisms
This paper examines the recovery of user context in indoor environments with existing wireless infrastructures to enable assistive systems. We present a novel approach to the extra...
Dinh Q. Phung, Brett Adams, Kha Tran, Svetha Venka...
PERCOM
2009
ACM
16 years 5 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
PERCOM
2005
ACM
16 years 4 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
PERCOM
2004
ACM
16 years 4 months ago
Employing User Feedback for Fast, Accurate, Low-Maintenance Geolocationing
One way to improve inferences on sensor data is to tune the algorithms through a time-consuming offline procedure. A less expensive, and potentially more accurate method is to use...
Ezekiel S. Bhasker, Steven W. Brown, William G. Gr...