Sciweavers

5447 search results - page 921 / 1090
» Environment-Mediated Mobile Computing
Sort
View
CSREASAM
2008
15 years 5 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
CSREASAM
2006
15 years 5 months ago
Enhanced Group Key Generation Protocol
Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, th...
Sunghyuck Hong, Noé Lopez-Benitez
EUROPAR
2010
Springer
15 years 5 months ago
Ants in Parking Lots
Ants provide an attractive metaphor for robots that "cooperate" in performing complex tasks. What, however, are the algorithmic consequences of following this metaphor? ...
Arnold L. Rosenberg
HUC
2010
Springer
15 years 4 months ago
Accuracy characterization of cell tower localization
Cell tower triangulation is a popular technique for determining the location of a mobile device. However, cell tower triangulation methods require the knowledge of the actual loca...
Jie Yang, Alexander Varshavsky, Hongbo Liu, Yingyi...
ADT
2008
15 years 4 months ago
Analytical investigation of intersection based range-free localization
By range-free localization, the positions of a mobile device can be limited to the coverage area of a radio access network cell. The drawback of such approach is the coarseness of ...
Michel Sortais, Sven D. Hermann, Adam Wolisz