Sciweavers

5068 search results - page 867 / 1014
» Basic Computations in Wireless Networks
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 2 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
MOBICOM
2012
ACM
13 years 17 days ago
MIDU: enabling MIMO full duplex
Given that full duplex (FD) and MIMO both employ multiple antenna resources, an important question that arises is how to make the choice between MIMO and FD? We show that optimal ...
Ehsan Aryafar, Mohammad Ali Khojastepour, Karthike...
PERCOM
2009
ACM
15 years 10 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
93
Voted
MOBISYS
2009
ACM
15 years 10 months ago
Fidelity-aware replication for mobile devices
Mobile devices often store data in reduced resolutions or custom formats in order to accommodate resource constraints and tailormade software. The Polyjuz framework enables sharin...
Kaushik Veeraraghavan, Venugopalan Ramasubramanian...
78
Voted
CHI
2006
ACM
15 years 10 months ago
Broken expectations in the digital home
As part of an ongoing effort to understand ease of use of digital home technologies, we undertook an exploratory study of people who use their home networks for more than just bro...
Sara A. Bly, Bill N. Schilit, David W. McDonald, B...