Sciweavers

888 search results - page 102 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
NDSS
2008
IEEE
15 years 6 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor
PERCOM
2010
ACM
15 years 3 months ago
Pervasive maps: Explore and interact with pervasive environments
—Efficient discovery of nearby devices and services is one of the preconditions to obtain a usable pervasive environment. Typical user interfaces in these environments hide the ...
Geert Vanderhulst, Kris Luyten, Karin Coninx
AINTEC
2007
Springer
15 years 6 months ago
A Real-Time Performance-Monitoring Tool for Emergency Networks
Abstract. Emergency networks normally operate under highly unpredictable wireless environment and hence real time performance information holds a great significance that cannot be...
Shuprabha Shakya, Mohammad Abdul Awal, Dwijendra K...
HUC
1999
Springer
15 years 4 months ago
QoS and Context Awareness for Mobile Computing
Systems must provide for mobile applications to be aware of the context in which they are being used. This is necessary to permit adaptation to heterogeneity of hosts and networks...
Dan Chalmers, Morris Sloman
PERCOM
2006
ACM
15 years 11 months ago
Concept for Hierarchical and Distributed Processing of Area Based Triggers
Area based triggers denote notifications being generated if a mobile client changes its spatial relation to a defined area, e.g. if it enters or leaves it. By these triggers, new ...
Sven D. Hermann, Günter Schäfer, Adam Wo...