Sciweavers

5068 search results - page 817 / 1014
» Basic Computations in Wireless Networks
Sort
View
PERCOM
2004
ACM
16 years 4 months ago
Modelling and Using Imperfect Context Information
Most recently developed context-aware software applications make unrealistic assumptions about the quality of the available context information, which can lead to inappropriate ac...
Karen Henricksen, Jadwiga Indulska
PERCOM
2003
ACM
16 years 4 months ago
Context-Sensitive Resource Discovery
This paper presents the "Solar" system framework that allows resources to advertise context-sensitive names and for applications to make context-sensitive name queries. ...
Guanling Chen, David Kotz
MOBISYS
2003
ACM
16 years 4 months ago
Full TCP/IP for 8-Bit Architectures
We describe two small and portable TCP/IP implementations fulfilling the subset of RFC1122 requirements needed for full host-to-host interoperability. Our TCP/IP implementations d...
Adam Dunkels
144
Voted
MOBIHOC
2004
ACM
16 years 4 months ago
Locating cache proxies in manets
Caching Internet based services is a potentially important application for MANETs, as it can improve mobile users' perceived quality of service, reduce their energy consumpti...
Roy Friedman, Maria Gradinariu, Gwendal Simon
PERCOM
2009
ACM
15 years 11 months ago
Privacy-Preserving Event Detection in Pervasive Spaces
Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra,...