Sciweavers

1030 search results - page 31 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
MIDDLEWARE
2010
Springer
14 years 8 months ago
The Gossple Anonymous Social Network
While social networks provide news from old buddies, you can learn a lot more from people you do not know, but with whom you share many interests. We show in this paper how to bui...
Marin Bertier, Davide Frey, Rachid Guerraoui, Anne...
77
Voted
IDEAS
2005
IEEE
97views Database» more  IDEAS 2005»
15 years 3 months ago
An Integrated Commit Protocol for Mobile Network Databases
While traditional fixed-wired network protocols like 2Phase-Commit guarantee atomicity, we cannot use them in mobile low bandwidth networks where network partitioning, node failu...
Joos-Hendrik Böse, Stefan Böttcher, Le G...
AINA
2006
IEEE
15 years 1 months ago
An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless Networks
Achieving IP handoff with a short latency and minimal packet loss is essential for mobile devices that roam across IP subnets. Many existing solutions require changes to be made t...
Ken C. K. Tsang, Roy S. C. Ho, Mark C. M. Tsang, C...
80
Voted
CSE
2009
IEEE
15 years 4 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
PE
2007
Springer
175views Optimization» more  PE 2007»
14 years 9 months ago
Delay and resource analysis in MANETs in presence of throwboxes
This paper addresses the delay analysis and resource consumption in mobile ad hoc networks (MANETs) equipped with throwboxes. Throwboxes are stationary, wireless devices that act ...
Mouhamad Ibrahim, Ahmad Al Hanbali, Philippe Nain