Sciweavers

336 search results - page 31 / 68
» Mobile values, new names, and secure communication
Sort
View
MSWIM
2006
ACM
15 years 3 months ago
Pattern matching based link quality prediction in wireless mobile ad hoc networks
As mobile devices, such as laptops, PDAs or mobile phones, are getting more and more ubiquitous and are able to communicate with each other via wireless technologies, the paradigm...
Károly Farkas, Theus Hossmann, Lukas Ruf, B...
MOBISYS
2008
ACM
15 years 9 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
WOWMOM
2006
ACM
92views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Inter-Regional Messenger Scheduling in Delay Tolerant Mobile Networks
The evolution of wireless devices along with the increase in user mobility have created new challenges such as network partitioning and intermittent connectivity. These new challe...
Khaled A. Harras, Kevin C. Almeroth
SSD
2005
Springer
150views Database» more  SSD 2005»
15 years 3 months ago
Opportunistic Data Dissemination in Mobile Peer-to-Peer Networks
In this paper we examine the dissemination of availability reports about resources in mobile peer-to-peer networks, where moving objects communicate with each other via short-range...
A. Prasad Sistla, Ouri Wolfson, Bo Xu
ACSAC
2010
IEEE
14 years 7 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...