Sciweavers

5446 search results - page 373 / 1090
» Mobile computing
Sort
View
INFOCOM
2010
IEEE
15 years 2 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
MOBISYS
2008
ACM
16 years 4 months ago
Micro-Blog: sharing and querying content through mobile phones and social participation
Recent years have witnessed the impacts of distributed content sharing (Wikipedia, Blogger), social networks (Facebook, MySpace), sensor networks, and pervasive computing. We beli...
Al Schmidt, Jack Li, Landon P. Cox, Romit Roy Chou...
BROADNETS
2007
IEEE
15 years 10 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty
NCA
2005
IEEE
15 years 10 months ago
Location-based Publish/Subscribe
This paper introduces the concept of location-based publish/subscribe (LPS), which allows mobile ad hoc applications to anonymously communicate with each other, depending on their...
Patrick Th. Eugster, Benoît Garbinato, Adria...
EUC
2004
Springer
15 years 8 months ago
Defining Scope of Query for Location-Dependent Information Services
The demand of information services has fueled in recent years. However, the requested of correct answer in a mobile environment needs to have more attentions. This is due to the sc...
James Jayaputera, David Taniar