Sciweavers

888 search results - page 112 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
DSN
2007
IEEE
15 years 6 months ago
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...
WICON
2008
15 years 1 months ago
Comparative performance evaluation of idle mode location management schemes for IEEE 802.16j multihop relay networks
IEEE 802.16 WiMAX is a promising technology to provide broadband wireless networking access. IEEE 802.16j Mobile Multihop Relay standard introduces multihop relaying to WiMAX syst...
Kuan-Po Lin, Hung-Yu Wei
ADHOC
2008
88views more  ADHOC 2008»
15 years 1 days ago
Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking
As wireless devices become more pervasive, mobile ad hoc networks are gaining importance, motivating the development of highly scalable ad hoc networking techniques. In this paper...
Shu Du, Ahamed Khan, Santashil PalChaudhuri, Ansle...
PERCOM
2008
ACM
14 years 12 months ago
The sensor internet at work: Locating everyday items using mobile phones
We present a system for monitoring and locating everyday items using mobile phones. The system is based on phones which are enhanced with the capability to detect electronically t...
Christian Frank, Philipp Bolliger, Friedemann Matt...
IJIPT
2007
111views more  IJIPT 2007»
14 years 11 months ago
System architecture of a mobile message transport system
Many scenarios of beyond 3G mobile communications describe the integration of various access technologies into one system. Being always best connected under certain optimization c...
Bernd Gloss