Sciweavers

638 search results - page 86 / 128
» Mobility Management Using P2P Techniques in Wireless Network...
Sort
View
CCS
2001
ACM
15 years 2 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
MOBISYS
2005
ACM
15 years 9 months ago
MediaAlert: a broadcast video monitoring and alerting system for mobile users
? We present a system for automatic monitoring and timely dissemination of multimedia information to a range of mobile information appliances based on each user's interest pro...
Bin Wei, Bernard Renger, Yih-Farn Chen, Rittwik Ja...
PERCOM
2004
ACM
15 years 9 months ago
Energy-Aware Media Transcoding in Wireless Systems
In distributed systems, transcoding techniques have been used to customize multimedia objects, utilizing trade-offs between the quality and sizes of these objects to provide diffe...
Christian Poellabauer, Karsten Schwan
SIGCOMM
2012
ACM
13 years 5 days ago
TUBE: time-dependent pricing for mobile data
The two largest U.S. wireless ISPs have recently moved towards usage-based pricing to better manage the growing demand on their networks. Yet usage-based pricing still requires IS...
Sangtae Ha, Soumya Sen, Carlee Joe-Wong, Youngbin ...
GIS
2003
ACM
15 years 10 months ago
Nearest neighbor queries in road networks
With wireless communications and geo-positioning being widely available, it becomes possible to offer new e-services that provide mobile users with information about other mobile ...
Christian S. Jensen, Jan Kolárvr, Torben Ba...