Sciweavers

1207 search results - page 233 / 242
» Network mobility support in PMIPv6 network
Sort
View
PADS
2004
ACM
15 years 5 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
MOBIDE
1999
ACM
15 years 4 months ago
Pervasive Computing: What is it Good for?
The first mass-produced pervasive computing devices are starting to appear—the AutoPC, the Internet-connected ScreenFridge, and the combination Microwave Oven/Home Banking term...
Andrew C. Huang, Benjamin C. Ling, Shankar Ponneka...
JUCS
2008
149views more  JUCS 2008»
14 years 11 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
PERCOM
2010
ACM
14 years 10 months ago
The co-evolution of taxi drivers and their in-car navigation systems
In the recent years, the massive use of in-car navigation systems has symbolized the emergence of location-based services for wayfinding. This market success creates the opportunit...
Fabien Girardin, Josep Blat
WWW
2003
ACM
16 years 11 days ago
The chatty web: emergent semantics through gossiping
This paper describes a novel approach for obtaining semantic interoperability among data sources in a bottom-up, semiautomatic manner without relying on pre-existing, global seman...
Karl Aberer, Manfred Hauswirth, Philippe Cudr&eacu...