Sciweavers

225 search results - page 15 / 45
» Privacy-enhanced social network routing in opportunistic net...
Sort
View
CHI
2010
ACM
15 years 2 months ago
Moving beyond untagging: photo privacy in a tagged world
Photo tagging is a popular feature of many social network sites that allows users to annotate uploaded images with those who are in them, explicitly linking the photo to each pers...
Andrew Besmer, Heather Richter Lipford
WIMOB
2008
IEEE
15 years 4 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...
68
Voted
COMCOM
2008
143views more  COMCOM 2008»
14 years 9 months ago
Cross-layer rate control, medium access control and routing design in cooperative VANET
In this paper, we address the rate control, the Medium Access Control (MAC) and the routing problem for cooperative Vehicular Ad-Hoc Network (VANET) in the framework of cross-laye...
Liang Zhou, Baoyu Zheng, Benoit Geller, Anne Wei, ...
PETRA
2010
ACM
15 years 1 months ago
Opportunistic strategies for lightweight signal processing for body sensor networks
We present a mobile platform for body sensor networking based on a smartphone for lightweight signal processing of sensor mote data. The platform allows for local processing of da...
Edmund Y. W. Seto, Eladio Martin, Allen Y. Yang, P...
ANSS
2008
IEEE
15 years 4 months ago
A Simulation Study of Common Mobility Models for Opportunistic Networks
Understanding mobility characteristics is important for the design and analysis of routing schemes for mobile ad hoc networks (MANETs). This is especially true for mobile opportun...
Muhammad Abdulla, Robert Simon