Sciweavers

888 search results - page 176 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
Rate control for PSD limited multiple access systems through linear programming
In this paper we discuss rate control for multiuser multicarrier systems, where the transmitter has a single antenna and is subject to a PSD mask limitation while the receiver has...
Amir Leshem, Ephraim Zehavi
ACSAC
2010
IEEE
14 years 7 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
DIMVA
2006
14 years 11 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...
TMC
2010
115views more  TMC 2010»
14 years 7 months ago
Controlled Wi-Fi Sharing in Cities: A Decentralized Approach Relying on Indirect Reciprocity
—In densely populated cities, Wi-Fi networks—private or otherwise—are ubiquitous. We focus on the provision of citywide broadband communication capability to mobile users thr...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...
108
Voted
MOBIDE
2006
ACM
15 years 3 months ago
Towards correcting input data errors probabilistically using integrity constraints
Mobile and pervasive applications frequently rely on devices such as RFID antennas or sensors (light, temperature, motion) to provide them information about the physical world. Th...
Nodira Khoussainova, Magdalena Balazinska, Dan Suc...