Sciweavers

1490 search results - page 85 / 298
» Monitoring Mobile Code
Sort
View
128
Voted
CNSR
2010
IEEE
131views Communications» more  CNSR 2010»
15 years 19 days ago
Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks
We focus on the interference between mobile stations as they attempt to gain access to an OFDMA-based WiMAX/IEEE 802.16 network. We propose a set of strategies that enable base st...
Paul Boone, Michel Barbeau, Evangelos Kranakis
113
Voted
CHI
2008
ACM
15 years 4 months ago
Comparing access methods and quality of 3g mobile video streaming services
In this paper we examine the access methods and the quality of experience of current unicast video streaming services in 3G mobile networks. A packet-switched mobile video client,...
Marcin Davies, Antitza Dantcheva, Peter Fröhl...
IJON
2006
90views more  IJON 2006»
15 years 2 months ago
Adaptive sensory processing for efficient place coding
This work presents a neural model of self-localisation implemented on a simulated mobile robot with a realistic visual input. A population of modelled place cells with overlapping...
Denis Sheynikhovich, Ricardo Chavarriaga, Thomas S...
PET
2009
Springer
15 years 9 months ago
On the Optimal Placement of Mix Zones
Abstract. In mobile wireless networks, third parties can track the location of mobile nodes by monitoring the pseudonyms used for identification. A frequently proposed solution to...
Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux
HOTNETS
2010
14 years 9 months ago
Diagnosing mobile applications in the wild
There are a lot of applications that run on modern mobile operating systems. Inevitably, some of these applications fail in the hands of users. Diagnosing a failure to identify the...
Sharad Agarwal, Ratul Mahajan, Alice Zheng, Victor...