Sciweavers

744 search results - page 72 / 149
» Location Management Based on the Mobility Patterns of Mobile...
Sort
View
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
15 years 11 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
LCN
2007
IEEE
15 years 4 months ago
Overlay Bandwidth Management: Scheduling and Active Queue Management of Overlay Flows
— Peer-to-peer and mobile networks gained significant attention of both research community and industry. Applying the peer-to-peer paradigm in mobile networks lead to several pr...
Kalman Graffi, Konstantin Pussep, Sebastian Kaune,...
SAC
2006
ACM
15 years 3 months ago
Personalization and visualization on handheld devices
The small screen size of handheld mobile devices poses an inherent problem in visualizing data: very often it is too difficult and unpleasant to navigate through the plethora of p...
Dongsong Zhang, George Karabatis, Zhiyuan Chen, Bo...
MHCI
2009
Springer
15 years 2 months ago
Minimizing mobile phone disruption via smart profile management
In this paper, we describe the Smart Profile Management application that was designed to help minimize mobile phone disruptions. The system does this by making phone profile chang...
Amnon Dekel, Dan Nacht, Scott Kirkpatrick
ATAL
2004
Springer
15 years 3 months ago
Stigmergic Learning for Self-Organizing Mobile Ad-Hoc Networks (MANET's)
In recent years, mobile ad-hoc networks (MANET’s) have been deployed in various scenarios, but their scalability is severely restricted by the human operators’ ability to conf...
H. Van Dyke Parunak, Sven Brueckner