Sciweavers

683 search results - page 98 / 137
» Exploiting Logical Mobility in Mobile Computing Middleware
Sort
View
128
Voted
USENIX
2000
15 years 5 months ago
Location-Aware Scheduling with Minimal Infrastructure
Mobile computers often benefit from software which adapts to their location. For example, a computer might be backed up when at the office, or the default printer might always be ...
John S. Heidemann, Dhaval Shah
144
Voted
MOBICOM
2006
ACM
15 years 9 months ago
Analysis and implications of student contact patterns derived from campus schedules
Characterizing mobility or contact patterns in a campus environment is of interest for a variety of reasons. Existing studies of these patterns can be classified into two basic a...
Vikram Srinivasan, Mehul Motani, Wei Tsang Ooi
138
Voted
FEDCSIS
2011
90views more  FEDCSIS 2011»
14 years 3 months ago
Services Composition Model for Home-Automation peer-to-peer Pervasive Computing
—Collaborative mechanisms between services are a crucial aspect in the recent development of pervasive computing systems based on the paradigm of service-oriented architecture. C...
Juan A. Holgado-Terriza, Sandra Rodríguez-V...
144
Voted
CORR
2004
Springer
100views Education» more  CORR 2004»
15 years 3 months ago
On Spatial Conjunction as Second-Order Logic
Abstract. Spatial conjunction is a powerful construct for reasoning about dynamically allocated data structures, as well as concurrent, distributed and mobile computation. While re...
Viktor Kuncak, Martin C. Rinard
118
Voted
WCNC
2008
IEEE
15 years 10 months ago
Anonymous ID-Based Group Key Agreement for Wireless Networks
—Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID...
Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel