Sciweavers

888 search results - page 108 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
SIGCOMM
2010
ACM
15 years 3 days ago
Mobile data offloading: how much can WiFi deliver?
This is a quantitative study on the performance of 3G mobile data offloading through WiFi networks. We recruited about 100 iPhone users from a metropolitan area and collected stat...
Kyunghan Lee, Injong Rhee, Joohyun Lee, Yung Yi, S...
MOBICOM
1996
ACM
15 years 4 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
ICMCS
2006
IEEE
148views Multimedia» more  ICMCS 2006»
15 years 6 months ago
A Handover Approach to DVB-H Services
DVB-H offers a new platform for IP-based services and contributes to universal access. There are many challenges of providing multimedia TV experience for DVB-H users anywhere any...
Ville Ollikainen, Chengyuan Peng
PVLDB
2010
184views more  PVLDB 2010»
14 years 10 months ago
Adaptive Logging for Mobile Device
Nowadays, due to the increased user requirements of the fast and reliable data management operation for mobile applications, major device vendors use embedded DBMS for their mobil...
Young-Seok Kim, Heegyu Jin, Kyoung-Gu Woo
100
Voted
ADHOCNOW
2009
Springer
15 years 6 months ago
SenSearch: GPS and Witness Assisted Tracking for Delay Tolerant Sensor Networks
Abstract— Mobile wireless sensor networks have to be robust against the limitations of the underlying platform. While lightweight form factor makes them an attractive choice for ...
Lun Jiang, Jyh-How Huang, Ankur Kamthe, Tao Liu, I...