Sciweavers

888 search results - page 174 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
142
Voted
PERVASIVE
2011
Springer
14 years 2 months ago
NextPlace: A Spatio-temporal Prediction Framework for Pervasive Systems
Abstract. Accurate and fine-grained prediction of future user location and geographical profile has interesting and promising applications including targeted content service, adv...
Salvatore Scellato, Mirco Musolesi, Cecilia Mascol...
DRM
2006
Springer
15 years 3 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
102
Voted
IJAMC
2010
134views more  IJAMC 2010»
14 years 10 months ago
HyperVerse: simulation and testbed reconciled
—When dealing with dynamic large-scale topologies such as those underlying peer-to-peer (P2P) distributed virtual environments (DVE), one inescapably reaches the point where eith...
Jean Botev, Markus Esch, Hermann Schloss, Ingo Sch...
96
Voted
PIMRC
2008
IEEE
15 years 6 months ago
Multicasting JPEG2000 images over MIMO systems
Abstract—Increasing demand for high-speed and efficient multimedia transmission over wireless networks has driven tremendous research on enhancing the performance of multimedia ...
Mahin Torki, Atousa Hajshirmohammadi
INFOCOM
2007
IEEE
15 years 6 months ago
Proactive Scan: Fast Handoff with Smart Triggers for 802.11 Wireless LAN
Abstract— It has been a challenging problem to support VoIPtype delay sensitive applications in an 802.11 wireless LAN, because the standard handoff procedure implemented in many...
Haitao Wu, Kun Tan, Yongguang Zhang, Qian Zhang