Sciweavers

11217 search results - page 1834 / 2244
» Network Coding for Wireless Networks
Sort
View
PERCOM
2005
ACM
16 years 4 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
PERCOM
2005
ACM
16 years 4 months ago
Hoarding Content in M-Learning Context
With the advances in mobile technologies is now possible to support learners and teachers activities on the move. We analyzed the functionalities that should be provided by a gene...
Anna Trifonova, Marco Ronchetti
PERCOM
2004
ACM
16 years 4 months ago
PCOM - A Component System for Pervasive Computing
Applications in the Pervasive Computing domain are challenged by the dynamism in which their execution environment changes, e.g. due to user mobility. As a result, applications ha...
Christian Becker, Marcus Handte, Gregor Schiele, K...
PERCOM
2004
ACM
16 years 4 months ago
Dynamic Federation of Partitioned Applications in Ubiquitous Computing Environments
A framework for the dynamic aggregation of ubiquitous computers is presented. The framework aggregates applications from more than one mobile component that can migrate from compu...
Ichiro Satoh
PERCOM
2004
ACM
16 years 4 months ago
Comprehensive Structured Context Profiles (CSCP): Design and Experiences
In dynamic heterogeneous environments, such as Pervasive Computing, context-aware adaptation is a key concept to meet the varying requirements of different clients. To enable such...
Sven Buchholz, Thomas Hamann, Gerald Hübsch
« Prev « First page 1834 / 2244 Last » Next »