Sciweavers

55 search results - page 5 / 11
» Cluestr: mobile social networking for enhanced group communi...
Sort
View
MADNES
2005
Springer
15 years 3 months ago
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis
EDBT
2008
ACM
166views Database» more  EDBT 2008»
15 years 10 months ago
Social ties and their relevance to churn in mobile telecom networks
Social Network Analysis has emerged as a key paradigm in modern sociology, technology, and information sciences. The paradigm stems from the view that the attributes of an individ...
Koustuv Dasgupta, Rahul Singh, Balaji Viswanathan,...
ICRA
2006
IEEE
128views Robotics» more  ICRA 2006»
15 years 3 months ago
Distributed Construction by Mobile Robots with Enhanced Building Blocks
— We describe a system in which autonomous robots assemble two-dimensional structures out of square building blocks. A fixed set of local control rules is sufficient for a grou...
Justin Werfel, Yaneer Bar-Yam, Daniela Rus, Radhik...
MOBISYS
2008
ACM
15 years 9 months ago
Micro-Blog: sharing and querying content through mobile phones and social participation
Recent years have witnessed the impacts of distributed content sharing (Wikipedia, Blogger), social networks (Facebook, MySpace), sensor networks, and pervasive computing. We beli...
Al Schmidt, Jack Li, Landon P. Cox, Romit Roy Chou...
PERCOM
2005
ACM
15 years 9 months ago
A Privacy Enhanced Service Architecture for Mobile Users
Location, presence and messaging services provide the essential ingredients for emerging information and communications services. Nevertheless, the users are concerned about revea...
Sandford Bessler, Oliver Jorns