Sciweavers

8655 search results - page 1271 / 1731
» Challenges for Trusted Computing
Sort
View
PERCOM
2007
ACM
16 years 4 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
PERCOM
2007
ACM
16 years 4 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
PERCOM
2007
ACM
16 years 4 months ago
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays
Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Also, effectively monitoring a large field by analyzing images from m...
Yunhao Liu, Lei Chen 0002, Jian Pei, Qiuxia Chen, ...
PERCOM
2007
ACM
16 years 4 months ago
Dynamic Carrier-Assisted Routing in Mobile Networks
We propose to use node mobility to enhance routing capability in a mobile network. A dual-control planes model is presented, which includes the traditional S(stationary)-plane for ...
Jie Wu
PERCOM
2006
ACM
16 years 4 months ago
Exploring Spatial Correlation for Link Quality Estimation in Wireless Sensor Networks
The irregularity in quality of wireless communication links poses significant research challenges in wireless sensor network design. Dynamic network conditions and environmental f...
Yingqi Xu, Wang-Chien Lee
« Prev « First page 1271 / 1731 Last » Next »