Sciweavers

146 search results - page 26 / 30
» Mobile opportunistic commerce: mechanisms, architecture, and...
Sort
View
EUROPAR
2006
Springer
15 years 1 months ago
Context Awareness: An Experiment with Hoarding
Abstract. Computer mobility allows people to use computers in varied and changing environments. This variability forces applications to adapt thus requiring awareness of the comput...
João Garcia, Luís Veiga, Paulo Ferre...
CSE
2009
IEEE
15 years 1 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
IWCMC
2006
ACM
15 years 3 months ago
VANETCODE: network coding to enhance cooperative downloading in vehicular ad-hoc networks
Inter-vehicular communication is fast emerging as a popular application for mobile ad-hoc networks. Content distribution in Vehicular Ad-Hoc Networks (VANET) is particularly chall...
Shabbir Ahmed, Salil S. Kanhere
129
Voted
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 3 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
SECON
2010
IEEE
14 years 7 months ago
iPoint: A Platform-Independent Passive Information Kiosk for Cell Phones
We introduce iPoint, a passive device that can interact and deliver information to virtually any mobile phone equipped with a WiFi network interface and a camera. The iPoint does n...
Hooman Javaheri, Guevara Noubir