Sciweavers

888 search results - page 28 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
ICAT
2006
IEEE
15 years 5 months ago
Personal Information Annotation on Wearable Computer Users with Hybrid Peer-to-Peer Communication
This paper proposes a wearable annotation overlay system which can correctly annotate dynamic users of wearable computers. To provide users with the newest annotation information, ...
Koji Makita, Masayuki Kanbara, Naokazu Yokoya
GLOBECOM
2010
IEEE
14 years 9 months ago
Optimal Content Transmission Policy in Publish-Subscribe Mobile Social Networks
Abstract--We consider the problem of dynamic content distribution in publish-subscribe mobile social networks. Mobile users subscribe to the content provider. Then, when new conten...
Dusit Niyato, Ping Wang, Ekram Hossain, Yifan Li
JCM
2006
99views more  JCM 2006»
14 years 11 months ago
VIP (VHE in Mobile IP Networks) Architecture
In this study we propose a new architecture named VIP (VHE in mobile IP networks) which guarantees authorized user access and user mobility management. The main goal is to bring th...
Octavio Ramirez Rojas, Jalel Ben-Othman, Safouane ...
166
Voted
DSS
2011
14 years 3 months ago
Estimating the effect of word of mouth on churn and cross-buying in the mobile phone market with Markov logic networks
Abstract: Much has been written about word of mouth and customer behavior. Telephone call detail records provide a novel way to understand the strength of the relationship between ...
Torsten Dierkes, Martin Bichler, Ramayya Krishnan
P2P
2010
IEEE
127views Communications» more  P2P 2010»
14 years 9 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...