Sciweavers

1675 search results - page 298 / 335
» Mobility Tracking for Mobile Ad Hoc Networks
Sort
View
SISW
2005
IEEE
15 years 3 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
ANSS
2003
IEEE
15 years 3 months ago
An ns-based Bluetooth Topology Construction Simulation Environment
Bluetooth is an emerging technology in wireless applications, and many related issues are yet to be explored both in academia and industry. Because of the complexity and the dynam...
Chia-Jui Hsu, Yuh-Jzer Joung
IMECS
2007
14 years 11 months ago
Approaches to an Adaptive Middleware for Mobile Services
Abstract—Adaptive middleware and wireless networks are hot topics in many discussions today. Literature describes a lot of approaches which are based upon existing middleware tec...
Ulrich Dümichen, Uwe Baumgarten
WS
2006
ACM
15 years 3 months ago
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the p...
Dave Singelée, Bart Preneel
79
Voted
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
15 years 10 months ago
Mobile call graphs: beyond power-law and lognormal distributions
We analyze a massive social network, gathered from the records of a large mobile phone operator, with more than a million users and tens of millions of calls. We examine the distr...
Mukund Seshadri, Sridhar Machiraju, Ashwin Sridhar...