Sciweavers

2347 search results - page 70 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
MSWIM
2006
ACM
15 years 3 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
FOCS
2000
IEEE
15 years 2 months ago
Hierarchical Placement and Network Design Problems
In this paper, we give the first constant-approximations for a number of layered network design problems. We begin by modeling hierarchical caching, where caches are placed in la...
Sudipto Guha, Adam Meyerson, Kamesh Munagala
INFOSCALE
2009
ACM
15 years 2 months ago
CAWA: Continuous Approximate Where-About Queries
With the current proliferation of wireless networks and mobile device technologies, the management of moving object databases to facilitate queries over these domains has been exte...
Alexander J. Aved, Kien A. Hua, Antoniya Petkova
HUC
2010
Springer
14 years 10 months ago
Accuracy characterization of cell tower localization
Cell tower triangulation is a popular technique for determining the location of a mobile device. However, cell tower triangulation methods require the knowledge of the actual loca...
Jie Yang, Alexander Varshavsky, Hongbo Liu, Yingyi...
PUC
2002
110views more  PUC 2002»
14 years 9 months ago
Citywide: Supporting Interactive Digital Experiences Across Physical Space
The Citywide project is exploring ways in which technology can provide people with rich and engaging digital experiences as they move through physical space, including historical e...
Shahram Izadi, Mike Fraser, Steve Benford, Martin ...